Article Search
닫기

Original Article

Split Viewer

International Journal of Fuzzy Logic and Intelligent Systems 2023; 23(3): 336-352

Published online September 25, 2023

https://doi.org/10.5391/IJFIS.2023.23.3.336

© The Korean Institute of Intelligent Systems

Analytic Review of Healthcare Software by Using Quantum Computing Security Techniques

Sultan H. Almotiri1 , Mohd Nadeem2 , Mohammed A. Al Ghamdi1 , and Raees Ahmad Khan3

1Department of Computer Science, Umm Al-Qura University, Makkah City, Saudi Arabia
2School of Computer Application, Babu Banarasi Das University, Lucknow, Uttar Pradesh, India
3Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh, India

Correspondence to :
Mohd Nadeem (mohd.nadeem1155@gmail.com)

Received: March 27, 2023; Revised: July 9, 2023; Accepted: August 4, 2023

This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which permits unrestricted noncommercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

The core objective of this security research is to ensure that healthcare software (HS) is secure when operating on a fully functional quantum computer. Developers are constantly coming up with innovative methods to maintain usability while maximizing security. The degree of security is not as high as it should be despite numerous efforts made in this area by developers and security specialists. It is also crucial to conduct additional research on the best methods for enhancing and assessing the security of healthcare technologies. This study specifically aims to assess the security of HS during quantum computing (QC) operations. Based on the empirical analysis of a substantial amount of data, this study makes recommendations for creating a secure HS. In the quantum age, decision-makers frequently experience difficulties in integrating extremely secure software. This study aims for the inclusion of security-related aspects. This study also suggests utilizing a novel technique that evaluates healthcare software security (HSS) simultaneously using the analytic hierarchy process (AHP), fuzzy sets (FS), and a method for order of preference by similarity to an ideal solution (TOPSIS). The F-AHP and F-TOPSIS hybrid solution techniques were evaluated using 10 quantum security algorithms. The security assessment conclusions indicate that this cutting-edge hybrid technique is the most accurate and useful method to evaluate the security of an HS. Most importantly, these findings will benefit security management without jeopardizing end users.

Keywords: Quantum computing, Quantum software security, Healthcare software security, Fuzzy AHP, Fuzzy TOPSIS

The American law firm BakerHostetler released a report called “Information Security Occurrence Response Report” in 2022. It mentions that both the number and severity of security incidents are on the rise [1]. After analyzing more than 1,270 events, BakerHostetler discovered that 24% of safety incidents were caused by phishing, and 56% of them were caused by network outages. The remaining 20% of assaults were attributed to accidental disclosure, system errors, and stolen/misplaced data or equipment. Thirty-seven percent of the analyzed occurrences involved ransomware, an increase of 10% over the previous year. This has a wide range of effects, including new and higher expectations for younger medical professionals, new and higher standards for patient convenience and simplicity of participation with their healthcare organization, and the protection of their data. Another important consequence of this new world is the importance of healthcare data security.

According to the Software Advice’s 2022 Healthcare Data Security Survey, 36% of the healthcare companies in the United States have experienced a data breach (Figure 1). In addition, phishing was widespread. Phishing attacks were the primary cause of break-notice obligations, increasing from 43% in 2020 to 60% in 2021 [24]. According to many high-profile production network attacks involving outsiders in 2020, the research also noted that merchant-caused incidents were on the rise. The average number of days required to spot an attack was 47 days, which was significantly lower than the 2020 average (92 days). This was partially attributable to the acceptance of more advanced security tools. Overall, it required zero days, down from three days in 2019, and was identical to that of the previous year. The interval between the control and measurable examinations was also shortened; in 2021, it was 30 days, as opposed to 36 days in 2020. At that moment, more than 18,000 solar wind customers had installed the Sunburst update, allowing the remote access Trojans to infect all their client companies and frameworks. The US state, banking, and health departments were among the notable casualties of this attack [5].

Additionally, reports have shown that this malware affects privately held companies, such as FireEye, Intel, Cisco, and Microsoft. As acknowledged by Microsoft, it was difficult to estimate the number of afflicted associations and organizations because of the update’s ability to spread to numerous client devices. Currently, there is no clear indication as to who was responsible for the assault. State-approved programmers in Russia and China have drawn criticism, but the lack of thorough verification encourages further investigation. Software security includes procedures in security architecture to aid maintenance. This indicates that a piece of software is subjected to software security testing before being put on the market to determine its resistance to harmful assaults. Software security aims to build secure software from the ground up without the need for extra security layers. The next stage involves providing users with instructions on how to use the software correctly to fend off attacks. Software security is essential because malware attacks can compromise the availability, validity, and integrity of any software. If programmers consider this earlier rather than later in the development process, the damage can be stopped before it starts [6].

Network security refers to the security between devices connected to the same network. Security of both hardware and software is essential in this situation. To secure a network, businesses search for measures to prevent harmful usage [7]. The devices used in this scenario are the subject of endpoint security. Computers, cell phones, tablets, and other devices are secure in terms of both software and hardware to keep out unauthorized users. User control, software security, and other encryption techniques are widely used for this [8]. Cybersecurity, usually referred to as internet security, is concerned with the usage and transfer of information. Several layers of encryption and authentication are often employed to prevent cybersecurity attacks because information is intercepted during them [9]. It is necessary to protect data flows and devices connected to the same network [10].

The main goal of this study is based on the quantum algorithm as an alternative for evaluating healthcare software security (HSS). The evaluations assessed the security factors of software in the healthcare domain. Software security is necessary for the evolution of quantum computers. A team of researchers (Google and IBM) developed a quantum processor that can easily break the present security mechanisms [9, 11]. The estimation is required for the upgrade mechanism of the software.

Section 2 points out the researcher’s contribution in the area of HSS individually; Section 3 elaborates on the HSS factors and quantum algorithm that may be used for security purposes; Section 4 explains the estimation approach of soft computing, i.e., fuzzy analytic hierarchy process (F-AHP) and fuzzy techniques for order of preference by similarity to an ideal solution (F-TOPSIS); Section 5 compares the evaluation procedure with the classical one; and Section 6 determines the sensitivity analysis of the estimation of HSS. Finally, Section 7 explains the outcomes of the analysis and details the application of the evaluation concerning the future aspects of the results.

In healthcare software (HS) development, security is an essential part of IT-based organizations. The healthcare sector has witnessed significant advancements over the last decade. The evolution of artificial intelligence keeps the healthcare sector more vulnerable. After the development of quantum computers, software security has been at risk in the classical phase. Detailed studies on software security are discussed in this section of the literature review.

Bhavin et al. [12] mentioned that the healthcare sector has the right to know how and why data are being used under the general data protection rule. However, because the Internet is an open channel through which healthcare data move, it is possible for bad things to happen, such as sensitive data being stolen or stored data being changed. Privacy and security are challenging to preserve in traditional healthcare systems. The quantum computing (QC) examines several security architectures for protecting electronic health records and a common encryption scheme based on these facts. Quantum-enabled security algorithms protect data against quantum attacks on the traditional encryption method.

Sanavio et al. [13] stated that QC can perform tasks that were previously unimaginable because it uses quantum bits and the quantum properties of subatomic particles, such as superposition, entanglement, and interference, as well as other fundamentally different ways to process information than traditional computing systems. QC systems promise much faster processing; however, research and development are still in the early stages. QC has not been studied much in important fields such as healthcare, even though it could lead to important advances like faster DNA sequencing, drug development, and other processes that require considerable computing power. In this study, we look at how QC could be used in healthcare systems. QC has the potential to change the way healthcare systems work by making it possible to do complicated calculations faster [14] and identify security weaknesses of traditional cryptography systems. We examine the difficulties hindering the use of QC systems in healthcare and the causes that have contributed to them.

Davids et al. [15] mentioned conceptual extensions of many body systems and quantum computations that have yet to realize their full potential, including quantum clinical medicine and quantum surgery, and discussed QC principles. Advances in precise nanoengineering and new mathematical formalisms for algorithmic design, including quantum mechanics, category theory, quantum algebraic geometry, and others, are laying the groundwork for this intriguing area of medical and future surgical science. The authors predicted that QC would lead to improvements in healthcare, surgery, and medicine.

Malviya and Sundram [16] mentioned that the healthcare sector provides assistance to people fighting against illnesses and disorders. Medical practitioners provide state-of-the-art therapies and drugs to manage illness-related side effects. Patients want a modern, tailored healthcare system that can keep pace with their fast-paced lives. A QC system is a solution to the need for low latency and low energy consumption in real-time health data collection and analysis. QC is a cutting-edge computing technology based on the interesting phenomena of quantum physics and quantum mechanics. In this instance, physics, mathematics, information theory, and computer science are well integrated. It is feasible to attain speeds exponentially faster than those of conventional computers, have a larger processing capacity, consume less energy, and more by changing the behavior of microscopic particles like atoms, electrons, photons, and so on.

QC is growing rapidly, not only because its hardware is faster and can run complicated algorithms more quickly but also because it has a new tool for analyzing data that can solve problems with standard machine learning [17]. It uses ideas from quantum mechanics, such as superposition and entanglement, which have long been used in physics to perform computing tasks that are faster and possibly more complex than those that can be performed with traditional algorithms.

Clinical care and medical research were the first places where computers were used in a new manner. QC has the potential to make computers more powerful and initiate a new era in computer technology. A new era of computing has begun. The potential of QC in enhancing population health, imaging, diagnosis, and treatment is currently based solely on experiments. The use of quantum computers in routine medical and scientific applications has yet to be realized. Many machine learning and artificial intelligence algorithms have the potential to leverage QC to produce findings instantly. Researchers will continue to be the only ones who can use QC until it reaches this level of accessibility [18].

Perumal and Nadar [19] showed and explained that healthcare systems are inherently heterogeneous because each device has a different operating system, platform, and architecture. This variability affects communication latency and security issues. An optimized quantum approach is used to manage keys with the least overhead and decrease threats while simultaneously enhancing healthcare information security. The quantum channel was also used to simulate communication with the key authority. A dedicated quantum channel is used to distribute the generated key, which further improves security by lowering leakage, transmission errors, and eavesdropping. The healthcare user group and the content server communicate with the key server via a quantum channel that sends photons. Numerical data support key generation, optimization, and quantum distribution strategies. To encrypt and decrypt healthcare content, the security of patient data is improved, and quantum simulation estimates in healthcare networks decreased by 90% [19]. In the online healthcare world, the process of sending information between the main and each branch has always been important. In recent years, security checks for network technologies have become increasingly common. A secure and high-capacity information transfer protocol for healthcare cyber services is being developed using quantum algorithms and quantum expansion technology. This innovative technique simultaneously embeds the secret data in three layers and encrypts it. Finally, a quantum channel was used to send extremely secure secret information in the form of a quantum state. This new protocol provides a revolutionary steganography method for quantum images. In essence, the fact that the steganography protocol cannot be observed means that it has a higher level of security that may stop several attacks and make the process of sending information safer [20, 21].

Privacy [P1]: Individual data will only be used privately, and only authorized parties will have access to the requested data [6].

Confidentiality [P2]: Data confidentiality means that only authorized parties can access the information [7].

Availability [P3]: Accessibility is a valid user’s access to resources and information that cannot be forcibly restricted [22].

Auditability [P4]: Appropriateness is a key safety component. For example, audit logs primarily record who accessed which electronic health record (EHR) (or particular personal health record), why they did so, and the timestamp of each life cycle operation [23].

Accountability [P5]: Inappropriate conduct results in an audit and holds the offending person or entity accountable [7].

Authenticity [P6]: The ability to verify the identity of anyone who wants to see sensitive information [24].

Anonymity [P7]: Entities lack a visible identity for privacy-related reasons. Users who are recognized by something other than their own identities or who maintain pseudo-anonymity are more common. Complete secrecy is challenging [24].

Integrity [P8]: Information must be accurate and unaltered by unauthorized parties while being transmitted [25].

3.1 Quantum Alternative (QA)

Developers choose QC algorithms that enable security for future advancements in computing [11]. QA1–QA10 are alternatives for estimating HSS. The details of QA are discussed below:

CRYSTALS-Kyber [QA1], the security of CRYSTALS-Kyber, an IND-CCA2-secure key encapsulation approach, is based on the difficulty of solving the learning-with-errors issue over module lattices. The quantum-safe CRYSTALS-Kyber method is a member of the CRYSTALS (Cryptographic Suite for Algebraic Lattices) family of algorithms. The intrinsic color stability factor is now backing Kyber-1024 Round 2. Advanced Encryption Standard (AES)-256 and Kyber-1024 both strive to be as secure as possible [26].

In Crystals-Dilithium [QA2], the grid-based digital signature architecture of Precious Stones dilithium makes it secure. This is because finding short vectors inside the lattice is difficult. The crystals dilithium digital signature algorithm belongs to the crystals family of algorithms. The size of a polynomial matrix in a crystals dilithium key affects its robustness. For instance, the matrix in crystals is 6 by 5: dilithium (6, 5). As the matrix size increases, the key strength rises. Only digital signatures can be generated and validated using crystals dilithium keys [27].

Falcon [QA3], the fourth standardization protocol, the digital signature algorithm SPHINCS+, was developed with the help of Ward Beullens, another current IBM scientist. Its foundation is the difficulty in obtaining short vectors in NTRU lattices. Dilithium and Falcon have complementary uses, despite being lattice-based digital signature techniques. Falcon has more limited characteristics, whereas dilithium is simpler to construct and use [28]. QC will be the next development in computation, increasing existing computer power to help solve difficult and complex problems. Although we are still developing and investigating the possibilities of quantum technology, we are aware that the two most popular encryption techniques currently in use are not secure against fault-tolerant universal quantum computers [29].

SPHINCS+ [QA4]: The most cautious signature system is SPHINCS+, which relies only on the reliability of the common hash algorithms. Depending on the SPHINCS+ variant used, this strong security assurance comes at the cost of either a fairly large signature size or a fairly long signing time. SPHINCS+ is very similar to the NIST-recommended and IETF-specified state full extended markel signature scheme. SPHINCS+ is ideal for wider use because, unlike XMSS, it is not state-full [30].

BIKE [QA5]: As BIKE employs only transient keys, a fresh key pair is created after every key exchange. Consequently, a GJS attack that depends on noticing numerous unsuccessful decoding attempts for the same private key is useless. We introduce three BIKE variants, referred to as BIKE-1, BIKE-2, and BIKE-3. Despite adhering to either the Niederreiter or McEliece framework, each version does so in significant ways [31].

HQC [QA6]: The Hamming quasi-cyclic (HQC) public-key encryption technique is based on the difficulty of decoding random quasi-cyclic codes in the Hamming metric. This design is similar to that of Alekhnovich’s cryptosystem, which uses ineffective random linear codes. Using repetition-code-tensed BCH codes, Aguilar et al. first suggested the HQC in 2016. In a later study by Aragon et al., the HQC-RMRS two-version, which combines the Reed-Muller and Reed-Solomon codes, was proposed. The NIST standardization process considers the IND-CCA2 KEM variation of HQC-RMRS. This version was produced by transforming the IND-CPA public-key encryption technique using the Fujisaki Okamoto (FO) transform [32].

GeMSS [QA7], an excellent multivariate signature scheme as its name implies, is a small-signature multivariate-based signature scheme. It has a rapid verification procedure and a medium-sized or large public key. GeMSS is a direct successor to QUARTZ and incorporates design ideas from the Gui multivariate signature scheme. The preceding schemes were constructed from the HFE cryptosystem using the so-called minus and vinegar modifiers or HFEv (HFE). It is reasonable to state that HFE and its variations are the most studied schemes in multivariate cryptography [33]. In the Nessie Encrypt competition for public-key signatures, QUARTZ was entered. It creates 128-bit signatures with an 80-bit security level. Unlike many other multivariate methods, QUARTZ has not been actively countered. This is remarkable in light of the lively multivariate scheme cryptanalysis. The most popular attacks used to configure GeMSS remain active. GeMSS is a faster variant of QUARTZ that employs the most recent advancements in multivariate cryptography to outperform QUARTZ while still achieving higher levels of security [34].

The innovative Picnic signature algorithm was built on Picnic [QA8], which uses zero-knowledge proofs rarely used in the real world. One of Picnic’s main architectural ideas, the MPC-in-the-head paradigm, allows cryptographers to quickly create zero-knowledge proofs from multi-party compute protocols. Using symmetric-key cryptography, a person using this signature system creates a key pair, separating the public key from the private key. The signer then adds their signature to the paper to demonstrate that they have the secret key. A verifier can then use the public key to confirm that the signer knows the secret key and that it is not a threat without the signer having to give up the private key. Except for a few of Picnic’s parameter sets [35], the entire process is non-interactive and has been proven to be safe in quantum RAM model 1.

SIKE [QA9]: SIKE is a KEM based on super-singular elliptic curve isogenies. The fundamental key agreement mechanism, Super-singular Isogeny Die Hellman (SIDH), is comparable to classical techniques, such as ECDH and DH, while additionally offering defense against quantum attacks. A fascinating characteristic of SIKE that makes it desirable for situations with constrained bandwidth or storage is that it has the smallest key and cipher text size of any NIST candidate. The main drawback is that it performed somewhat slowly compared to other candidates, which is also stated in the NIST report on contenders for the second round [36]. Therefore, SIKE prioritizes more optimized implementations. For SIKE, efficient implementations are already available for Intel x64, ARMv8-A, and ARMv7-M, and there has been some initial work on AVX512. The effective use of z15 vector instructions to quicken SIKE is of special interest to us [37].

Frodo KEM [QA10]: A family of postquantum key encapsulation systems known as FrodoKEM is both conservative and useful. The difficulty of the learning with errors (LWE) problem determines the security level. Thus, the LWE is connected to difficult problems in ” algebraically unstructured” lattices. The foundation of FrodoKEM is FrodoPKE, which is an LWE public-key encryption technique. The Learning with Errors problem, its hardness against quantum algorithms, and the development of an LWE-based public-key encryption scheme were introduced. FrodoPKE builds on Regev’s earlier work on LWE and is an improved version of the Lindner-Peikert scheme, which was first proposed in 2011. To achieve chosen-ciphertext (IND-CCA) security, FrodoKEM modifies the IND-CPA-secure FrodoPKE technique [38].

Multicriteria decision analyses are based on a hierarchy of factors and their dependence on alternatives. Quantitative analyses of the HSS estimation evaluate the weights and ranks of the factors and alternatives. The artificial approaches of the fuzzified AHP estimate the weights of the factors associated with the HSS, as shown in Figure 2. The artificial approach of the fuzzy TOPSIS evaluates the ranks of the associated alternatives.

We used the hybrid neural approach of F-AHP and F-TOPSIS as soft computing tools for making decisions based on multiple criteria. The FAHP looks at the importance of each factor, while the F-TOPSIS looks at the importance of each alternative [6]. This strategy assesses the variables that affect the perspective of the HSS. The initial weighted values are based on a thorough assessment of the literature. We chose to fulfill our goals using a multi-model dynamic regular technique to assess the aspects associated with HSS. The F-AHP and F-TOPSIS hybrid approaches were used to assess and survey the component weights. F-TOPSIS provides the precise position of the variable relative to the other alternatives. The going with theory fuzzy system was used to accurately assess the items. We chose a soft-computing method to evaluate these factors quantitatively. One of the elements of the F-AHP and F-TOPSIS approaches is item evaluation. To improve the comprehension of the problems and the accuracy of the resources, numerous methodologies and assessment frameworks have been published in hard copies. However, F-AHP is the most effective multi-rule method for calculating the effect of an item’s health. However, F-AHP encounters certain difficulties [24]. To manage crossbreed F-AHP and F-TOPSIS, we merged the F-TOPSIS with a creative management strategy [39]. This unique approach makes it easier to assess the impact factor and its alternatives accurately.

4.1 Fuzzy AHP Methodology

These techniques determine the unmistakable productive assurance of problems involving influencing HSS using the F-AHP method.

It depends on the attributes and number of options that are most closely related to those attributes. The fuzzy numbers used to compare the F-AHP show how they are evaluated and ranked philologically [9]. Table 1 displays the corresponding fuzzy numbers for the comparison of the philological rankings. Figure 3 shows a fuzzy comparison measures (FCM) representation.

Subsequently, the F-AHP system assessed each substance submitted by the examiner. Subsequent improvements selected FCM from the hierarchical architecture. One metric assesses how a component and its selection affect various elective principles. Each variable had a pairwise relationship that acknowledged its importance to the whole (Figure 4). The following iteration of the F-AHP modifies the numerical value of the etymological phrases using fuzzy correlation measurements [23]. The heaviness of the pieces was determined using the FAHP technique. These approaches are described in detail as follows:

Step 1: To encourage participation and enrolment, work is based on a three-sided fuzzy number that spreads the yes or no justification among several sub-values in Table 1, as illustrated in Condition 1.

μa(x)=a[0,1],

As illustrated in Figure 4, choose or consider “l,” the lowest value, “mi,” the middle value, and “u,” the highest quality.

Step 2: We translated the phonetic phrases into FCM esteem after assessing their surroundings. A numerical mathematical mean test was applied to assess FCM. The mathematical mean was used to assess the critical outcomes between the components.

Step 3: Next, we considered the two-layered investigation system for the fuzzy pairwise examination lattice.

Ad˜=[k˜11dk˜12dk˜1nd,k˜21dk˜22dk˜2nd,,k˜n1dk˜n2dk˜nnd],k˜ij=i=1dk˜ijd,

where kijk˜ mentioned leader is on both the condition ith over jth in Conditions 2 and 3. If the inclination is multiple, the typical qualities are chosen.

Step 4: Expanding the order of the relevant components, typical trends were assessed. In a stepping stool based on preferences, paired assessment networks were built for each of the influential viewpoints from Situation 4.

A˜=k11˜k1n˜,,kn1˜k˜nn.

Step 5: Scenario 5 presents the mathematical mean method and calculates the fuzzy load and mathematical mean for each element. Scenario 6 shows the method used to determine fuzzy variable load.

p˜i=(j=1nk˜ij)1n,i=1,2,3,,n,w˜i=p˜i(p˜1p˜2p˜3p˜n)-1.

Step 6: Standardized weight models for scenarios 7 and 8 were determined and assessed.

Mi=w˜1w˜2w˜nn,Nri=MM1M2Mn.

Step 7: The next stage involved selecting the finest non-fuzzy presentation. This section discusses the best non-fuzzy performance (BNP), which acts as the focal point of region strategies. The link and effect of the fuzzy loads across all metrics were determined using Situation 9.

BNPwD1=[(uw1-lw1)+(miw1-lw1)]3+lw1.

4.2 Fuzzy Technique for Order of Preference by Similarity to Ideal Solution

The m alternative in geometrical arrangement with m points and n-dimensional area The TOPSIS methodology is used in multi-criteria decision selection for ranking. The core of the TOPSIS approach is the notion of the enduring and most remote distance from the positive ideal solution and the negative ideal solution for the most favorable and minimal ideal solution, respectively [40]. The TOPSIS approach significantly simplifies the process of assigning the appropriate position to the alternative and the factor concerning the criterion. To create uniformity in a fuzzy environment and indicate the importance of the criteria, TOPSIS assigns fuzzy numbers based on preference.

  • • Create a fuzzy decision matrix.

  • • Normalize the fuzzy decision matrix.

  • • Create a quantified fuzzy normalized decision matrix.

  • • Evaluate and define FPIS, FNIS.

  • • Evaluate the closeness coefficient.

The fuzzy decision matrix is created using Eq. (10).

K˜=C1                  CnA1Am[x˜11x˜1nx˜m1x˜mn].

Here, x˜ij=1D(x˜ij1x˜ijdx˜ijD),x˜ijd-the developer or practitioner makes an educated guess regarding the alternative Ai performance rating about the factor CJ estimated by the dth developer x˜ijd=(lijd,miijd,uijd).

Calculate the normalization of the fuzzy decision matrix using Eq. (11), which can be used for the normalized fuzzy decision matrix. The normalizing procedure was evaluated using Eq. (12):

P˜=[p˜ij]m×n,p˜ij=(lijuj+,miijuj+,uijuj+),uj+=max{uij,i=1,2,3,,n}.

The intended highest level uj+, where j = 1, 2, and so on. The worst case is 0 if n is greater than 1. FCM remained the accepted ij. For the FCM, the normalization process can be performed in the same manner. A quantified fuzzy normalized decision matrix () should be created. To calculate the weighted normalized fuzzy decision matrix, we use Eq. (13):

Q˜=[q˜ij]m×n,i=1,2,,m;   j=1,2,3,,n,

where ij = ijij.

The components ij are normalized positive FCM, and the weighted normalized fuzzy decision matrix shows that their range lies within a narrow interval [0, 1].

By assessing and defining fuzzy positive ideal solution (FPIS) and fuzzy negative ideal solution (FNIS), the FPIS A+ (aspiration levels) and the FNIS A are shown in Eqs. (14) and (15), respectively.

A+=(q˜1*,,q˜j*,,q˜n*),A-1=(q˜1*,,q˜j*,,q˜n*).

q˜1*=(1,1,1)w˜ij=(Lwj,Mwj,Hwj) and q˜ij-=(0,0,0), j = 1, 2, 3, …, n.

Applying the area compensation approach, as shown in Eqs. (16) and (17), the difference between each alternative and FPIS and FNIS is given by d˜i+ and d˜i- the difference between each alternative, and A+ and A− are given by the equations.

d˜i+=j=1nd(q˜ij,q˜ij*),i=1,2,,m;j=1,2,,n,d˜i-=j=1nd(q˜ij,q˜ij*),i=1,2,,m;j=1,2,,n.
Check the closeness coefficient

The degree of relative gaps is represented by the closeness coefficient (CC̃i), which can be determined using Eq. (18). The CC combines the selections to obtain the appropriate levels for each element. The closeness coefficient, which is employed to recover the alternatives, determines their estimation and fuzzy gap of alternatives. Each alternative was assessed and a comparison to the optimum solution was estimated.

CC˜i=k˜i-k˜i++k˜i-=1-k˜i+k˜i++ki-,i=1,2,,m.

Here, k˜i-k˜i++k˜i-– the first alternative’s fuzzy satisfaction degree-is specified as ith alternative, and k˜i+k˜i++k˜i-

– is defined as the fuzzy gap degree in the ith alternative. The alternatives were ranked using the F-TOPSIS method and approach.

F-AHP is a hybrid soft-computing method that combines F-AHP and F-TOPSIS. This gives the weight of each influencing factor from P1 to P8. From QA1 to QA10, the F-TOPSIS technique ranked the choices. The majority of the time, subjective assessment is adequate for determining how the HSS factors will affect things. It is challenging to quantitatively evaluate HSS. Although a property of order at one level affects one or more qualities at a more significant level, the effects are not the same, as shown in Figure 4. Things might vary. To evaluate this, we converted the aggregated qualities into chains of importance.

Table 2 lists the different security risks P1 to P8, and their FCM weights and BNP are listed in Table 3.

Tables 57 display the various values of the subjective cognition results described in the equations, normalized fuzzy decision matrix, and weighted normalized decision matrix, respectively. These values were obtained using the F-TOPSIS approach.

The F-TOPSIS equation in Table 8 indicates the degree of closeness. The various HSS properties were comparable. According to expert judgment and data, the factors (P1 through P8) and attributes (QA1 through QA10) of the HSS are in satisfactory condition pert judgment and data, the factors (P1 through P8) and attributes (QA1 through QA10) of the HSS are in satisfactory condition. Figure 5 shows the degree of proximity.

The same data, results, and output differ when different methodologies are applied. This guaranteed the effectiveness and dependability of the method [22]. In this study, we evaluated the efficacy and precision of the outcome using the F-AHPTOPSIS approach. AHP-TOPSIS uses the same data collection and estimation techniques as fuzzy AHP-TOPSIS; however, no fuzzifications are applied [39]. As a result, for the classic AHP-TOPSIS, the values are taken in their real number form. The distinction between the conventional and fuzzy AHP-TOPSIS results is presented in Table 8 and Figure 6. The results of the F-AHPTOPSIS method and those from the traditional AHPTOPSIS approach had a Pearson correlation coefficient of 0.999176. The F-AHP and F-TOPSIS procedures and methods were superior to the second technique in terms of effectiveness.

Using the sensitivity analyses [41, 42] shown in Table 9, the results were checked as each variable was changed. Sensitivity analysis was performed based on the variables’ weights [43]. Several experiments for each factor with the same number of participants were conducted in our HSS-based investigation to confirm the sensitivity analyses [44, 45]. The satisfaction level (CC-i) was computed using the F-AHPTOSIS method by calculating the weight of each factor (P1–P8 as a constant). The results of the sensitivity analyses are presented in Table 9. The first rows of Table 9 and Figure 7 display the initial weights, whereas Figure 6 displays the first collection of data. According to the initial weights and outcomes, Factor-8 (P1–P8) had a high level of satisfaction (CC-i). Ten experiments were conducted, from QA1 to QA10. The findings of eight studies showed that Factor-8 (P1–P8) still had a high degree of pleasure (CC-i). P2 was also a factor in each experiment and was assigned the least weight. The different correlations between the data show that alternative ratings are weight dependent [46, 47].

Software is becoming increasingly complicated and important in everyday life. However, the main reason why there are so many more data breaches is that there is insufficient security infrastructure that is easy to use. Dominion National, an insurance company, found a nine-year attack on its servers that could have put the personal information of 2.96 million patients at risk. These infractions have led to the theft or exposure of more than 189 million healthcare documents. Therefore, there is an urgent need to evaluate the security of software products using high-quality methods built in. The goal of this investigation was to calculate HSS. To this end, a case study was conducted on six hospital management software companies. To fulfill its goals, this study used ten alternatives in addition to eight security attributes at level I, namely QA1 to QA10, which include QA1, QA2, QA3, QA4, QA5, QA6, QA7, QA8, QA9, and QA10.

The results of this empirical investigation will help experts create software with the correct level of security. Several security models each estimate security in various ways. Nevertheless, few security model options are available for a single product. Furthermore, only a small percentage employ TOPSIS, F-AHP, or other multi-criteria decision-making techniques. The authors used the unified fuzzy AHP-TOPSIS of the MCDM. Fuzzy logic is particularly adept at resolving ambiguous and imprecise information in decision-making challenges; this property of the AHP properly portrays real-world problems and yields better solutions. In addition, TOPSIS supports the selection of the best option from the given options by effectively categorizing alternatives. To attain the best outcomes compared to other MCDM approaches, this study used the combined fuzzy AHP-TOPSIS. According to the findings of this study, the QA6 program provided the highest level of security and user satisfaction among the ten alternatives. The highlights of our study are listed below along with a summary of the results.

Pros: Secure HSS apps can assist programmers and designers in producing superior programs that can completely please users.

  • • With the help of the F-AHP-derived results of this study, practitioners can group qualities into groups and choose security design options when making software products.

  • • This will provide software products with long-lasting security.

  • • Security is a significant problem in the quantum world that is currently unaddressed. This study will serve as the gold standard for app developers to gain a thorough understanding of security architecture.

Changing validity:

  • • Finding and choosing attributes for security assessment is neither ideal nor definitive. The number of attributes or specific sets of qualities may have affected the results. Although MCDM techniques may be more suitable for MCDM issues, the combined fuzzy AHP-TOPSIS is a useful tool for security evaluations.

  • • In conclusion, this study employed an integrated fuzzy AHP-TOPSIS methodology to assess HSS security.

The powerful fuzzy AHP-TOPSIS Integrated method can be used to evaluate any MCDM problem with numerous parts and options, such as security assessments. Using a quantum computer, we calculated the security factors and estimated the HSS. The necessary weight variables were also assessed. The most recent evaluation of options using TOPSIS was tested for each of the open security options QA1–QA10 (QA6 > QA8 > QA7 > QA9 > QA5 > QA4 > QA10 > QA3 > QA1 > QA2). It was determined that QA-6, the alternative, offered the best possible health and user happiness. The proposed assessment approach enables an HSS to produce high-quality goods for systems with an anticipated level of security.

Fig. 1.

Graphical representation of security issues in the healthcare sector (2020–2022).


Fig. 2.

Hierarchical structure of the factors and alternatives.


Fig. 3.

Radar representation of FCM.


Fig. 4.

Fuzzy comparison measures.


Fig. 5.

Degree of closeness IoMT.


Fig. 6.

Comparison of quantum algorithm as an alternative with the fuzzified and non-fuzzified approach.


Fig. 7.

Graphical representation of sensitivity analysis.


Table. 1.

Table 1. Fuzzy comparison measures (FCM).

Linguistic termsFCM
Equal(1, 1, 1)
Not bad(2, 3, 4)
Good(4, 5, 6)
Very good(6, 7, 8)
Perfect(9, 9, 9)
Weak advantage(1, 2, 3)
Preferable(3, 4, 5)
Fairly good(5, 6, 7)
Absolute(7, 8, 9)

Table. 2.

Table 2. Fuzzy AHP aggregated pair wise matrix.

P1P2P3P4P5P6P7P8
P11, 1, 10.9, 1.1, 1.41.2, 1.5, 1.70.9, 1, 1.12.1, 2.9, 3.81.1, 1.3, 1.62.1, 2.9, 3.80.9, 1.1, 1.4
P20.7, 0.9, 1.11, 1, 11.1, 1.6, 1.91.8, 1.9, 2.12.7, 3.4, 42.1, 2.7, 3.22.7, 3.4, 41, 1, 1
P30.6, 0.7, 0.80.5, 0.6, 0.91, 1, 11.4, 1.6, 1.91.7, 2.2, 2.91.7, 2.1, 2.61.7, 2.2, 2.90.5, 0.6, 0.9
P40.9, 1, 1.20.5, 0.55, 0.60.5, 0.6, 0.71, 1, 11.9, 2.5, 2.71.6, 2.5, 2.61.9, 2.5, 2.70.5, 0.55, 0.6
P50.3, 0.3, 0.50.3, 0.35, 0.40.3, 0.5, 0.70.3, 0.4, 0.51, 1, 11, 1.1, 1.31, 1, 10.3, 0.35, 0.4
P60.7, 0.8, 10.3, 0.4, 0.50.4, 0.5, 0.60.4, 0.5, 0.60.8, 0.9, 1.11, 1, 10.8, 0.9, 1.10.3, 0.4, 0.5
P72.1, 2.9, 3.82.7, 3.4, 41.7, 2.2, 2.91.9, 2.5, 2.71, 1, 10.8, 0.9, 1.11, 1, 12.7, 3.4, 4
P80.9, 1.1, 1.41, 1, 10.5, 0.6, 0.90.5, 0.55, 0.60.5, 0.55, 0.60.3, 0.35, 0.40.3, 0.4, 0.51, 1, 1

Table. 3.

Table 3. Weights of factors.

FactorsWeightsBNPRank
P10.15, 0.18, 0.210.162
P20.19, 0.2, 0.220.191
P30.13, 0.16, 0.190.154
P40.12, 0.15, 0.180.163
P50.06, 0.08, 0.10.078
P60.07, 0.09, 0.130.096
P70.08, 0.1, 0.130.15
P80.05, 0.08, 0.120.087

Table. 4.

Table 4. Subjective cognition results.

Factors/AlternativesQA1QA2QA3QA4QA5QA6QA7QA8QA9QA10
P15, 7, 8.94.4, 6.4, 8.44.4, 6.4, 8.32.6, 4.6, 6.64.4, 6.4, 8.44.4, 6.4, 8.32.6, 4.6, 6.64.4, 6.4, 8.44.4, 6.4, 8.32.6, 4.6, 6.6
P25.2, 7.2, 94.6, 6.6, 8.63.8, 5.8, 7.72.6, 4.6, 6.64.6, 6.6, 8.63.8, 5.8, 7.72.6, 4.6, 6.64.6, 6.6, 8.63.8, 5.8, 7.72.6, 4.6, 6.6
P34.6, 6.6, 8.63.6, 5.6, 7.64, 6, 7.93, 5, 73.6, 5.6, 7.64, 6, 7.93, 5, 73.6, 5.6, 7.64, 6, 7.93, 5, 7
P45.6, 7.6, 9.24.8, 6.8, 8.74.6, 6.6, 8.43.2, 5.2, 7.24.8, 6.8, 8.74.6, 6.6, 8.43.2, 5.2, 7.24.8, 6.8, 8.74.6, 6.6, 8.43.2, 5.2, 7.2
P54.8, 6.8, 8.74, 6, 83.8, 5.8, 7.82.6, 4.6, 6.64, 6, 83.8, 5.8, 7.82.6, 4.6, 6.64, 6, 83.8, 5.8, 7.82.6, 4.6, 6.6
P65, 7, 94.4, 6.4, 8.44.2, 6.2, 8.12.5, 4.4, 6.44.4, 6.6, 8.44.2, 6.2, 8.12.5, 4.4, 6.44.4, 6.6, 8.44.2, 6.2, 8.12.5, 4.4, 6.4
P74.6, 6.6, 8.63.6, 5.6, 7.64, 6, 7.93, 5, 73.6, 5.6, 7.64, 6, 7.93, 5, 73.6, 5.6, 7.64, 6, 7.93, 5, 7
P85.6, 7.6, 9.24.8, 6.8, 8.74.6, 6.6, 8.43.2, 5.2, 7.24.8, 6.8, 8.74.6, 6.6, 8.43.2, 5.2, 7.24.8, 6.8, 8.74.6, 6.6, 8.43.2, 5.2, 7.2

Table. 5.

Table 5. Normalized fuzzy-decision matrix.

Factors/AlternativesQA1QA2QA3QA4QA5QA6QA7QA8QA9QA10
P10.54, 0.76, 0.970.48, 0.7, 0.90.48, 0.7, 0.90.28, 0.50, 0.720.48, 0.7, 0.90.48, 0.7, 0.90.28, 0.50, 0.720.48, 0.7, 0.90.48, 0.7, 0.90.28, 0.50, 0.72
P20.57, 0.78, 0.980.5, 0.72, 0.940.41, 0.63, 0.840.28, 0.50, 0.720.5, 0.72, 0.940.41, 0.63, 0.840.28, 0.50, 0.720.5, 0.72, 0.940.41, 0.63, 0.840.28, 0.50, 0.72
P30.5, 0.72, 0.940.39, 0.61, 0.830.44, 0.65, 0.860.33, 0.54, 0.760.39, 0.61, 0.830.44, 0.65, 0.860.33, 0.54, 0.760.39, 0.61, 0.830.44, 0.65, 0.860.33, 0.54, 0.76
P40.61, 0.83, 10.52, 0.74, 0.950.5, 0.72, 0.940.35, 0.57, 0.780.52, 0.74, 0.950.5, 0.72, 0.940.35, 0.57, 0.780.52, 0.74, 0.950.5, 0.72, 0.940.35, 0.57, 0.78
P50.52, 0.74, 0.950.44, 0.65, 0.860.41, 0.63, 0.850.28, 0.50, 0.720.44, 0.65, 0.860.41, 0.63, 0.850.28, 0.50, 0.720.44, 0.65, 0.860.41, 0.63, 0.850.28, 0.50, 0.72
P60.54, 0.76, 0.980.48, 0.7, 0.90.46, 0.67, 0.880.27, 0.48, 0.70.48, 0.7, 0.90.46, 0.67, 0.880.27, 0.48, 0.70.48, 0.7, 0.90.46, 0.67, 0.880.27, 0.48, 0.7
P70.5, 0.72, 0.940.39, 0.61, 0.830.44, 0.65, 0.860.33, 0.54, 0.760.39, 0.61, 0.830.44, 0.65, 0.860.33, 0.54, 0.760.39, 0.61, 0.830.44, 0.65, 0.860.33, 0.54, 0.76
P80.61, 0.83, 10.52, 0.74, 0.950.5, 0.72, 0.940.35, 0.57, 0.780.52, 0.74, 0.950.5, 0.72, 0.940.35, 0.57, 0.780.52, 0.74, 0.950.5, 0.72, 0.940.35, 0.57, 0.78

Table. 6.

Table 6. Weighted normalized fuzzy-decision matrix.

Factors/AlternativesQA1QA2QA3QA4QA5QA6QA7QA8QA9QA10
P10.08, 0.16, 0.280.07, 0.15, 0.260.07, 0.15, 0.260.04, 0.10, 0.210.07, 0.15, 0.260.07, 0.15, 0.260.04, 0.10, 0.210.07, 0.15, 0.260.07, 0.15, 0.260.04, 0.10, 0.21
P20.11, 0.20, 0.350.09, 0.19, 0.340.08, 0.16, 0.300.05, 0.13, 0.260.09, 0.19, 0.340.08, 0.16, 0.300.05, 0.13, 0.260.09, 0.19, 0.340.08, 0.16, 0.300.05, 0.13, 0.26
P30.07, 0.13, 0.250.05, 0.11, 0.220.06, 0.12, 0.230.04, 0.10, 0.210.05, 0.11, 0.220.06, 0.12, 0.230.04, 0.10, 0.210.05, 0.11, 0.220.06, 0.12, 0.230.04, 0.10, 0.21
P40.08, 0.14, 0.230.07, 0.13, 0.220.06, 0.12, 0.210.04, 0.10, 0.180.07, 0.13, 0.220.06, 0.12, 0.210.04, 0.10, 0.180.07, 0.13, 0.220.06, 0.12, 0.210.04, 0.10, 0.18
P50.03, 0.06, 0.110.03, 0.05, 0.100.02, 0.05, 0.100.02, 0.04, 0.090.03, 0.05, 0.100.02, 0.05, 0.100.02, 0.04, 0.090.03, 0.05, 0.100.02, 0.05, 0.100.02, 0.04, 0.09
P60.04, 0.07, 0.130.03, 0.07, 0.120.03, 0.06, 0.120.02, 0.05, 0.090.03, 0.07, 0.120.03, 0.06, 0.120.02, 0.05, 0.090.03, 0.07, 0.120.03, 0.06, 0.120.02, 0.05, 0.09
P70.07, 0.13, 0.250.05, 0.11, 0.220.06, 0.12, 0.230.04, 0.10, 0.210.05, 0.11, 0.220.06, 0.12, 0.230.04, 0.10, 0.210.05, 0.11, 0.220.06, 0.12, 0.230.04, 0.10, 0.21
P80.08, 0.14, 0.230.07, 0.13, 0.220.06, 0.12, 0.210.04, 0.10, 0.180.07, 0.13, 0.220.06, 0.12, 0.210.04, 0.10, 0.180.07, 0.13, 0.220.06, 0.12, 0.210.04, 0.10, 0.18

Table. 7.

Table 7. Closeness coefficients to aspired level among different alternatives.

dbidiGaps degree of CCipSatisfaction degree of CCi
QA10.240.490.670.33
QA20.820.90.780.22
QA30.270.510.650.35
QA40.320.480.60.4
QA50.420.610.590.41
QA60.270.30.520.48
QA70.30.420.580.42
QA80.420.530.550.45
QA90.290.420.590.41
QA100.30.580.650.35

Table. 8.

Table 8. The result of the usual/classical method and F-AHP and F-TOPSIS method.

Methods/AlternativesQA1QA2QA3QA4QA5QA6QA7QA8QA9QA10
Fuzzy-AHP-TOPSIS0.3312000.2224000.3525000.4055000.4147000.4849000.4256000.4551000.4161000.358900
Classical-AHP-TOPSIS0.3256000.2225000.3561000.4058000.4156000.4858000.4298000.4660000.4089000.347800

Table. 9.

Table 9. Sensitivity analysis.

ExperimentsWeights/AlternativesSatisfaction degree (CC-i)QA1QA2QA3QA4QA5QA6QA7QA8QA9QA10
Exp-0Original weights0.33120.22240.35250.40550.41470.48490.42560.45510.41610.3589
Exp-1P10.35230.23750.36710.42130.42060.49630.431790.4710.42940.36979
Exp-2P20.330.22750.35410.40980.41110.49580.42680.46150.42890.3648
Exp-3P30.33360.2220.36110.40380.40660.49430.42380.4570.42740.3618
Exp-4P40.34260.04450.34850.39390.41580.48530.42710.46620.41840.3651
Exp-5P50.30380.18990.31530.37860.37420.45650.39210.42460.38960.3301
Exp-6P60.25650.14090.27050.33530.32780.41280.40480.37820.34590.3428
Exp-7P70.34830.22780.36030.42820.4160.50150.43480.46640.43460.3728
Exp-8P80.33290.23950.35810.41380.42290.48640.42880.47330.41950.3668

  1. Agyepong, E, Cherdantseva, Y, Reinecke, P, and Burnap, P (2023). A systematic method for measuring the performance of a cyber security operations centre analyst. Computers & Security. 124. article no 102959
    CrossRef
  2. Esnoul, C, Colomo-Palacios, R, Jee, E, Chockalingam, S, Eidar Simensen, J, and Bae, DH (2023). Report on the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS-2022). ACM SIGSOFT Software Engineering Notes. 48, 81-84. https://doi.org/10.1145/3573074.3573095
    CrossRef
  3. Al Madi, N, Busjahn, T, and Sharif, B (2023). Summary of the Tenth International Workshop on Eye Movements in Programming (EMIP 2022). ACM SIGSOFT Software Engineering Notes. 48, 79-80. https://doi.org/10.1145/3573074.3573094
    CrossRef
  4. Chowdhury, N, and Gkioulos, V (2021). Cyber security training for critical infrastructure protection: a literature review. Computer Science Review. 40. article no 100361
    CrossRef
  5. Hadi, HJ, Cao, Y, Nisa, KU, Jamil, AM, and Ni, Q (2023). A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs. Journal of Network and Computer Applications. 213. article no 103607
    CrossRef
  6. Nadeem, M, Al-Amri, JF, Subahi, AF, Seh, AH, Khan, SA, Agrawal, A, and Khan, RA (2022). Multi-level hesitant fuzzy based model for usable-security assessment. Intelligent Automation & Soft Computing. 31. article no 103304
    CrossRef
  7. Alzahrani, FA, Ahmad, M, Nadeem, M, Kumar, R, and Khan, RA (2021). Integrity assessment of medical devices for improving hospital services. Computer, Materials & Continua. 67, 3619-3633. https://doi.org/10.32604/cmc.2021.014869
    CrossRef
  8. Pustokhina, IV, Pustokhin, DA, Gupta, D, Khanna, A, Shankar, K, and Nguyen, GN (2020). An effective training scheme for deep neural network in edge computing enabled Internet of Medical Things (IoMT) systems. IEEE Access. 8, 107112-107123. https://doi.org/10.1109/ACCESS.2020.3000322
    CrossRef
  9. Alyami, H, Nadeem, M, Alosaimi, W, Alharbi, A, Kumar, R, Gupta, BK, Agrawal, A, and Khan, RA (2022). Analyzing the data of software security life-span: quantum computing era. Intelligent Automation & Soft Computing. 31, 707-716. https://doi.org/10.32604/iasc.2022.020780
    CrossRef
  10. Li, J, Li, B, Wo, T, Hu, C, Huai, J, Liu, L, and Lam, KP (2012). CyberGuarder: a virtualization security assurance architecture for green cloud computing. Future Generation Computer Systems. 28, 379-390. https://doi.org/10.1016/J.FUTURE.2011.04.012
    CrossRef
  11. Arute, F, Arya, A, Babbush, R, Bacon, D, Bardin, JC, and Barends, R (2019). Quantum supremacy using a programmable superconducting processor. Nature. 574, 505-510. https://doi.org/10.1038/s41586-019-1666-5
    Pubmed CrossRef
  12. Bhavin, M, Tanwar, S, Sharma, N, Tyagi, S, and Kumar, N (2021). Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications. Journal of Information Security and Applications. 56. article no 102673
    CrossRef
  13. Sanavio, C, Tignone, E, and Ercolessi, E. (2023) . Entanglement classification via witness operators generated by support vector machine. Available: https://doi.org/10.48550/arxiv.2301.06759
  14. Ur Rasool, R, Ahmad, HF, Rafique, W, Qayyum, A, and Qadir, J. (2021) . Quantum computing for healthcare: a review. Available: https://dx.doi.org/10.36227/techrxiv.17198702.v2
  15. Davids, J, Nidstromer, L, and Ashrafian, H (2022). Artificial intelligence in medicine using quantum computing in the future of healthcare. Artificial Intelligence in Medicine. Cham, Germany: Springer, pp. 423-446 https://doi.org/10.1007/978-3-030-64573-1_338
  16. Malviya, R, and Sundram, S (2022). Exploring potential of quantum computing in creating smart healthcare. The Open Biology Journal. 9, 56-57. https://doi.org/10.2174/187419670210901005
    CrossRef
  17. Niraula, D, Jamaluddin, J, Pakela, J, and El Naqa, I (2022). Quantum computing for machine learning. Machine and Deep Learning in Oncology, Medical Physics and Radiology. Cham: Springer, pp. 79-102 https://doi.org/10.1007/978-3-030-83047-2_5
    CrossRef
  18. Solenov, D, Brieler, J, and Scherrer, JF (2018). The potential of quantum computing and machine learning to advance clinical research and change the practice of medicine. Missouri Medicine. 115, 463-467.
    Pubmed KoreaMed
  19. Perumal, AM, and Nadar, ERS (2021). Architectural framework and simulation of quantum key optimization techniques in healthcare networks for data security. Journal of Ambient Intelligence and Humanized Computing. 12, 7173-7180. https://doi.org/10.1007/s12652-020-02393-1
    CrossRef
  20. Qu, Z, and Sun, H (2022). A Secure Information Transmission Protocol for Healthcare Cyber Based on Quantum Image Expansion and Grover Search Algorithm. IEEE Transactions on Network Science and Engineering. https://doi.org/10.1109/TNSE.2022.3187861
  21. Kumar, PS (2016). A simple method for solving type-2 and type-4 fuzzy transportation problems. International Journal of Fuzzy Logic and Intelligent Systems. 16, 225-237. https://doi.org/10.5391/IJFIS.2016.16.4.225
    CrossRef
  22. Alharbi, A, Faizan, M, Alosaimi, W, Alyami, H, Nadeem, M, Khan, SA, Agrawal, A, and Khan, RA (2021). A link analysis algorithm for identification of key hidden services. Computers, Materials & Continua. 68, 877-886. https://doi.org/10.32604/cmc.2021.016887
    CrossRef
  23. Alenezi, M, Nadeem, M, Agrawal, A, Kumar, R, and Khan, RA (2020). Fuzzy multi criteria decision analysis method for assessing security design tactics for web applications. International Journal of Intelligent Engineering & Systems. 13, 181-196. https://doi.org/10.22266/ijies2020.1031.17
    CrossRef
  24. Alyami, H, Nadeem, M, Alharbi, A, Alosaimi, W, Ansari, MTJ, Pandey, D, Kumar, R, and Khan, RA (2021). The evaluation of software security through quantum computing techniques: a durability perspective. Applied Sciences. 11. article no 11784
    CrossRef
  25. Aguado, A, Lopez, V, Martinez-Mateo, J, Szyrkowiec, T, Autenrieth, A, Peev, M, Lopez, D, and Martin, V (2017). Hybrid conventional and quantum security for software defined and virtualized networks. Journal of Optical Communications and Networking. 9, 819-825. https://doi.org/10.1364/JOCN.9.000819
    CrossRef
  26. Bos, J, Ducas, L, Kiltz, E, Lepoint, T, Lyubashevsky, V, Schanck, JM, Schwabe, P, Seiler, G, and Stehle, D . CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM., Proceedings of 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, London, UK, Array, pp.353-367. https://doi.org/10.1109/EuroSP.2018.00032
  27. Sailada, S, Nohra, V, and Subramanian, N . Crystal dilithium algorithm for post quantum cryptography: experimentation and Usecase for eSign., Proceedings of 2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT), 2022, Trichy, India, Array, pp.1-6. https://doi.org/10.1109/ICEEICT53079.2022.9768654
  28. Riel, H . Quantum computing technology., Proceedings of 2021 IEEE International Electron Devices Meeting (IEDM), 2021, San Francisco, CA, Array, pp.1-3. https://doi.org/10.1109/IEDM19574.2021.9720538
  29. Fadillah, MHAZ, Idrus, B, Hasan, MK, and Mohd, SM . Impact of various IBM Quantum architectures with different properties on Grover’s algorithm., Proceedings of 2021 International Conference on Electrical Engineering and Informatics (ICEEI), 2021, Kuala Terengganu, Malaysia, Array, pp.1-6. https://doi.org/10.1109/ICEEI52609.2021.9611142
  30. Kumar, M (2022). Post-quantum cryptography Algorithm’s standardization and performance analysis. Array. 15. article no 100242
    CrossRef
  31. Kostic, D 2020. Analysis of the BIKE post-quantum cryptographic protocols and the Legendre pseudorandom function. Master’s thesis. École polytechnique fédérale de Lausanne (EPFL). Lausanne, Switzerland. https://doi.org/10.5075/EPFL-THESIS-7212
  32. Giuntini, R, Holik, F, Park, DK, Freytes, H, Blank, C, and Sergioli, G (2023). Quantum-inspired algorithm for direct multi-class classification. Applied Soft Computing. 134. article no 109956
    CrossRef
  33. Garcia Cid, MI, Alvaro Gonzalez, J, Ortiz Martín, L, and Del Rio Gomez, D . Disruptive quantum safe technologies., Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022, Vienna, Austria, Array, pp.1-8. https://doi.org/10.1145/3538969.3544484
  34. Raavi, M, Wuthier, S, Chandramouli, P, Balytskyi, Y, Zhou, X, and Chang, SY (2021). Security comparisons and performance analyses of post-quantum signature algorithms. Applied Cryptography and Network Security. Cham, Switzerland: Springer, pp. 424-447 https://doi.org/10.1007/978-3-030-78375-4_17
  35. Kurariya, P, Bhargava, A, Sailada, S, Subramanian, N, Bodhankar, J, and Kumar, A . Experimentation on Usage of PQC Algorithms for eSign., Proceedings of 2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA), 2022, Bangalore, India, Array, pp.1-6. https://doi.org/10.1109/PKIA56009.2022.9952354
  36. Grassl, M, Langenberg, B, Roetteler, M, and Steinwandt, R (2016). Applying Grover’s algorithm to AES: quantum resource estimates. Post-Quantum Cryptography. Cham, Switzerland: Springer, pp. 29-43 https://doi.org/10.1007/978-3-319-29360-8_3
    CrossRef
  37. Bradbury, J, and Hess, B. (2021) . Fast quantum-safe cryptography on IBM Z. Available: https://csrc.nist.gov/Presentations/2021/fast-quantum-safe-cryptography-on-ibm-z
  38. Howe, J, Martinoli, M, Oswald, E, and Regazzoni, F (2021). Exploring parallelism to improve the performance of frodokem in hardware. Journal of Cryptographic Engineering. 11, 317-327. https://doi.org/10.1007/s13389-021-00258-7
    CrossRef
  39. Alassery, F, Alzahrani, A, Khan, AI, Khan, A, Nadeem, M, and Ansari, MTJ (2022). Quantitative evaluation of mental-health in type-2 diabetes patients through computational model. Intelligent Automation & Soft Computing. 32, 1701-1715. https://doi.org/10.32604/IASC.2022.023314
    CrossRef
  40. Nadaban, S, Dzitac, S, and Dzitac, I (2016). TOPSIS Fuzzy: a general view. Procedia Computer Science. 91, 823-831. https://doi.org/10.1016/j.procs.2016.07.088
    CrossRef
  41. Khan, SA, Nadeem, M, Agrawal, A, Khan, RA, and Kumar, R (2021). Quantitative analysis of software security through fuzzy PROMETHEE-II methodology: a design perspective. International Journal of Modern Education & Computer Science. 13, 30-41. https://doi.org/10.5815/ijmecs.2021.06.04
    CrossRef
  42. Kumar, PS (2022). Computationally simple and efficient method for solving real-life mixed intuitionistic fuzzy 3D assignment problems. International Journal of Software Science and Computational Intelligence (IJSSCI). 14, 1-42. http://doi.org/10.4018/IJSSCI.291715
    CrossRef
  43. Kumar, PS (2020). Developing a new approach to solve solid assignment problems under intuitionistic fuzzy environment. International Journal of Fuzzy System Applications (IJFSA). 9, 1-34. http://doi.org/10.4018/IJFSA.2020010101
    CrossRef
  44. Ahmad, A, Saad, M, Al Ghamdi, M, Nyang, D, and Mohaisen, D (2022). BlockTrail: a service for secure and transparent blockchain-driven audit trails. IEEE Systems Journal. 16, 1367-1378. https://doi.org/10.1109/JSYST.2021.3097744
    CrossRef
  45. Darwish, MA, Yafi, E, Al Ghamdi, MA, and Almasri, A (2020). Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm. Arabian Journal for Science and Engineering. 45, 3369-3378. https://doi.org/10.1007/s13369-020-04394-w
    CrossRef
  46. Almotiri, SH (2021). Integrated fuzzy based computational mechanism for the selection of effective malicious traffic detection approach. IEEE Access. 9, 10751-10764. https://doi.org/10.1109/ACCESS.2021.3050420
    CrossRef
  47. Almotiri, SH, and Al Ghamdi, MA (2022). Network quality assessment in heterogeneous wireless settings: an optimization approach. Computers, Materials & Continua. 71, 439-455. https://doi.org/10.32604/cmc.2022.021012
    CrossRef

Sultan H. Almotiri received a B.Sc. degree (Hons.) in computer science from King Abdulaziz University, Saudi Arabia, in 2003, and an M.Sc. degree in Internet, computer, and system security and a Ph.D. degree in wireless security from Bradford University, U.K., in 2006, 2013. He was the Chairman of the Computer Science Department at Umm Al-Qura University, Saudi Arabia, the Vice Dean of eLearning and distance education, and the chief cybersecurity officer in the General Administration of Cybersecurity at Umm Al-Qura University. Currently a member of the scientific council at Umm Al-Qura University and an Associate Professor with the Computer Science Department, Faculty of Computer and Information Systems. His research interests include cyber security, cryptography, AI, machine learning, eHealth, eLearning, the IoT, RFID and wireless sensors, and image processing.

Mohd Nadeem is currently working as an Assistant Professor in the School of Computer Application at Babu Banarasi Das University, Lucknow, India. Received Ph.D. degree in IT from Babasaheb Bhimrao Ambedkar (A Central University), Lucknow, India, M.Tech. from Integral University and B.Tech. from Babasaheb Bhimrao Ambedkar College of Agriculture Engineering and Technology Etawah, Chandrasekhar Azad University, Kanpur, India. The research interests are in the areas of Quantum Software Security, Quantum Security, Network Security, and Quantum Computing.

Mohammed A. Al Ghamdi received his Ph.D. degree in computer science from the University of Warwick, UK, in 2012. In 2007, he obtained his master’s degree in Internet Software Systems with Merit from Birmingham University, Birmingham City, UK. Before that, he received his bachelor’s degree from King Abdul Aziz University, Jeddah City, Saudi Arabia in Computer Science with First-Class Honours in 2004. Since 2012, he has been with the Department of Computer Science, University of Umm AlQura, Makkah City, Saudi Arabia, as an Assistant Professor and then as an Associate Professor. He has authored over 50 papers in international conferences and journals, such as IEEE Systems Journal, IEEE Transactions on Engineering Management, IEEE ACCESS, Computers, Materials & Continua (CMC), The IEEE International Conference on Scalable Computing and Communications, and The International Conference on Cloud Computing and Services Science. His interests include Machine learning, Data Analysis, AI, Cloud Computing, and Cybersecurity. He is the founder of the scientific chair of Data and Artificial Intelligence at Umm Al-Qura University.

Raees Ahmad Khan is currently working as a Professor in the Department of Information Technology at Babasaheb Bhimrao Ambedkar University (A Central University), Lucknow, India. He has more than 20 years of teaching and research experience. He has published more than 300 research publications with good impact factors in reputed international journals and conferences, including IEEE, Springer, Elsevier, Inderscience, Hindawi, and IGI Global. He has published a number of national and international books (authored and edited) (including Chinese language). His research interests are in the different areas of security engineering and computational techniques.

Article

Original Article

International Journal of Fuzzy Logic and Intelligent Systems 2023; 23(3): 336-352

Published online September 25, 2023 https://doi.org/10.5391/IJFIS.2023.23.3.336

Copyright © The Korean Institute of Intelligent Systems.

Analytic Review of Healthcare Software by Using Quantum Computing Security Techniques

Sultan H. Almotiri1 , Mohd Nadeem2 , Mohammed A. Al Ghamdi1 , and Raees Ahmad Khan3

1Department of Computer Science, Umm Al-Qura University, Makkah City, Saudi Arabia
2School of Computer Application, Babu Banarasi Das University, Lucknow, Uttar Pradesh, India
3Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh, India

Correspondence to:Mohd Nadeem (mohd.nadeem1155@gmail.com)

Received: March 27, 2023; Revised: July 9, 2023; Accepted: August 4, 2023

This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which permits unrestricted noncommercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

The core objective of this security research is to ensure that healthcare software (HS) is secure when operating on a fully functional quantum computer. Developers are constantly coming up with innovative methods to maintain usability while maximizing security. The degree of security is not as high as it should be despite numerous efforts made in this area by developers and security specialists. It is also crucial to conduct additional research on the best methods for enhancing and assessing the security of healthcare technologies. This study specifically aims to assess the security of HS during quantum computing (QC) operations. Based on the empirical analysis of a substantial amount of data, this study makes recommendations for creating a secure HS. In the quantum age, decision-makers frequently experience difficulties in integrating extremely secure software. This study aims for the inclusion of security-related aspects. This study also suggests utilizing a novel technique that evaluates healthcare software security (HSS) simultaneously using the analytic hierarchy process (AHP), fuzzy sets (FS), and a method for order of preference by similarity to an ideal solution (TOPSIS). The F-AHP and F-TOPSIS hybrid solution techniques were evaluated using 10 quantum security algorithms. The security assessment conclusions indicate that this cutting-edge hybrid technique is the most accurate and useful method to evaluate the security of an HS. Most importantly, these findings will benefit security management without jeopardizing end users.

Keywords: Quantum computing, Quantum software security, Healthcare software security, Fuzzy AHP, Fuzzy TOPSIS

1. Introduction

The American law firm BakerHostetler released a report called “Information Security Occurrence Response Report” in 2022. It mentions that both the number and severity of security incidents are on the rise [1]. After analyzing more than 1,270 events, BakerHostetler discovered that 24% of safety incidents were caused by phishing, and 56% of them were caused by network outages. The remaining 20% of assaults were attributed to accidental disclosure, system errors, and stolen/misplaced data or equipment. Thirty-seven percent of the analyzed occurrences involved ransomware, an increase of 10% over the previous year. This has a wide range of effects, including new and higher expectations for younger medical professionals, new and higher standards for patient convenience and simplicity of participation with their healthcare organization, and the protection of their data. Another important consequence of this new world is the importance of healthcare data security.

According to the Software Advice’s 2022 Healthcare Data Security Survey, 36% of the healthcare companies in the United States have experienced a data breach (Figure 1). In addition, phishing was widespread. Phishing attacks were the primary cause of break-notice obligations, increasing from 43% in 2020 to 60% in 2021 [24]. According to many high-profile production network attacks involving outsiders in 2020, the research also noted that merchant-caused incidents were on the rise. The average number of days required to spot an attack was 47 days, which was significantly lower than the 2020 average (92 days). This was partially attributable to the acceptance of more advanced security tools. Overall, it required zero days, down from three days in 2019, and was identical to that of the previous year. The interval between the control and measurable examinations was also shortened; in 2021, it was 30 days, as opposed to 36 days in 2020. At that moment, more than 18,000 solar wind customers had installed the Sunburst update, allowing the remote access Trojans to infect all their client companies and frameworks. The US state, banking, and health departments were among the notable casualties of this attack [5].

Additionally, reports have shown that this malware affects privately held companies, such as FireEye, Intel, Cisco, and Microsoft. As acknowledged by Microsoft, it was difficult to estimate the number of afflicted associations and organizations because of the update’s ability to spread to numerous client devices. Currently, there is no clear indication as to who was responsible for the assault. State-approved programmers in Russia and China have drawn criticism, but the lack of thorough verification encourages further investigation. Software security includes procedures in security architecture to aid maintenance. This indicates that a piece of software is subjected to software security testing before being put on the market to determine its resistance to harmful assaults. Software security aims to build secure software from the ground up without the need for extra security layers. The next stage involves providing users with instructions on how to use the software correctly to fend off attacks. Software security is essential because malware attacks can compromise the availability, validity, and integrity of any software. If programmers consider this earlier rather than later in the development process, the damage can be stopped before it starts [6].

Network security refers to the security between devices connected to the same network. Security of both hardware and software is essential in this situation. To secure a network, businesses search for measures to prevent harmful usage [7]. The devices used in this scenario are the subject of endpoint security. Computers, cell phones, tablets, and other devices are secure in terms of both software and hardware to keep out unauthorized users. User control, software security, and other encryption techniques are widely used for this [8]. Cybersecurity, usually referred to as internet security, is concerned with the usage and transfer of information. Several layers of encryption and authentication are often employed to prevent cybersecurity attacks because information is intercepted during them [9]. It is necessary to protect data flows and devices connected to the same network [10].

The main goal of this study is based on the quantum algorithm as an alternative for evaluating healthcare software security (HSS). The evaluations assessed the security factors of software in the healthcare domain. Software security is necessary for the evolution of quantum computers. A team of researchers (Google and IBM) developed a quantum processor that can easily break the present security mechanisms [9, 11]. The estimation is required for the upgrade mechanism of the software.

Section 2 points out the researcher’s contribution in the area of HSS individually; Section 3 elaborates on the HSS factors and quantum algorithm that may be used for security purposes; Section 4 explains the estimation approach of soft computing, i.e., fuzzy analytic hierarchy process (F-AHP) and fuzzy techniques for order of preference by similarity to an ideal solution (F-TOPSIS); Section 5 compares the evaluation procedure with the classical one; and Section 6 determines the sensitivity analysis of the estimation of HSS. Finally, Section 7 explains the outcomes of the analysis and details the application of the evaluation concerning the future aspects of the results.

2. Literature Review

In healthcare software (HS) development, security is an essential part of IT-based organizations. The healthcare sector has witnessed significant advancements over the last decade. The evolution of artificial intelligence keeps the healthcare sector more vulnerable. After the development of quantum computers, software security has been at risk in the classical phase. Detailed studies on software security are discussed in this section of the literature review.

Bhavin et al. [12] mentioned that the healthcare sector has the right to know how and why data are being used under the general data protection rule. However, because the Internet is an open channel through which healthcare data move, it is possible for bad things to happen, such as sensitive data being stolen or stored data being changed. Privacy and security are challenging to preserve in traditional healthcare systems. The quantum computing (QC) examines several security architectures for protecting electronic health records and a common encryption scheme based on these facts. Quantum-enabled security algorithms protect data against quantum attacks on the traditional encryption method.

Sanavio et al. [13] stated that QC can perform tasks that were previously unimaginable because it uses quantum bits and the quantum properties of subatomic particles, such as superposition, entanglement, and interference, as well as other fundamentally different ways to process information than traditional computing systems. QC systems promise much faster processing; however, research and development are still in the early stages. QC has not been studied much in important fields such as healthcare, even though it could lead to important advances like faster DNA sequencing, drug development, and other processes that require considerable computing power. In this study, we look at how QC could be used in healthcare systems. QC has the potential to change the way healthcare systems work by making it possible to do complicated calculations faster [14] and identify security weaknesses of traditional cryptography systems. We examine the difficulties hindering the use of QC systems in healthcare and the causes that have contributed to them.

Davids et al. [15] mentioned conceptual extensions of many body systems and quantum computations that have yet to realize their full potential, including quantum clinical medicine and quantum surgery, and discussed QC principles. Advances in precise nanoengineering and new mathematical formalisms for algorithmic design, including quantum mechanics, category theory, quantum algebraic geometry, and others, are laying the groundwork for this intriguing area of medical and future surgical science. The authors predicted that QC would lead to improvements in healthcare, surgery, and medicine.

Malviya and Sundram [16] mentioned that the healthcare sector provides assistance to people fighting against illnesses and disorders. Medical practitioners provide state-of-the-art therapies and drugs to manage illness-related side effects. Patients want a modern, tailored healthcare system that can keep pace with their fast-paced lives. A QC system is a solution to the need for low latency and low energy consumption in real-time health data collection and analysis. QC is a cutting-edge computing technology based on the interesting phenomena of quantum physics and quantum mechanics. In this instance, physics, mathematics, information theory, and computer science are well integrated. It is feasible to attain speeds exponentially faster than those of conventional computers, have a larger processing capacity, consume less energy, and more by changing the behavior of microscopic particles like atoms, electrons, photons, and so on.

QC is growing rapidly, not only because its hardware is faster and can run complicated algorithms more quickly but also because it has a new tool for analyzing data that can solve problems with standard machine learning [17]. It uses ideas from quantum mechanics, such as superposition and entanglement, which have long been used in physics to perform computing tasks that are faster and possibly more complex than those that can be performed with traditional algorithms.

Clinical care and medical research were the first places where computers were used in a new manner. QC has the potential to make computers more powerful and initiate a new era in computer technology. A new era of computing has begun. The potential of QC in enhancing population health, imaging, diagnosis, and treatment is currently based solely on experiments. The use of quantum computers in routine medical and scientific applications has yet to be realized. Many machine learning and artificial intelligence algorithms have the potential to leverage QC to produce findings instantly. Researchers will continue to be the only ones who can use QC until it reaches this level of accessibility [18].

Perumal and Nadar [19] showed and explained that healthcare systems are inherently heterogeneous because each device has a different operating system, platform, and architecture. This variability affects communication latency and security issues. An optimized quantum approach is used to manage keys with the least overhead and decrease threats while simultaneously enhancing healthcare information security. The quantum channel was also used to simulate communication with the key authority. A dedicated quantum channel is used to distribute the generated key, which further improves security by lowering leakage, transmission errors, and eavesdropping. The healthcare user group and the content server communicate with the key server via a quantum channel that sends photons. Numerical data support key generation, optimization, and quantum distribution strategies. To encrypt and decrypt healthcare content, the security of patient data is improved, and quantum simulation estimates in healthcare networks decreased by 90% [19]. In the online healthcare world, the process of sending information between the main and each branch has always been important. In recent years, security checks for network technologies have become increasingly common. A secure and high-capacity information transfer protocol for healthcare cyber services is being developed using quantum algorithms and quantum expansion technology. This innovative technique simultaneously embeds the secret data in three layers and encrypts it. Finally, a quantum channel was used to send extremely secure secret information in the form of a quantum state. This new protocol provides a revolutionary steganography method for quantum images. In essence, the fact that the steganography protocol cannot be observed means that it has a higher level of security that may stop several attacks and make the process of sending information safer [20, 21].

3. Factors and Alternative of HSS

Privacy [P1]: Individual data will only be used privately, and only authorized parties will have access to the requested data [6].

Confidentiality [P2]: Data confidentiality means that only authorized parties can access the information [7].

Availability [P3]: Accessibility is a valid user’s access to resources and information that cannot be forcibly restricted [22].

Auditability [P4]: Appropriateness is a key safety component. For example, audit logs primarily record who accessed which electronic health record (EHR) (or particular personal health record), why they did so, and the timestamp of each life cycle operation [23].

Accountability [P5]: Inappropriate conduct results in an audit and holds the offending person or entity accountable [7].

Authenticity [P6]: The ability to verify the identity of anyone who wants to see sensitive information [24].

Anonymity [P7]: Entities lack a visible identity for privacy-related reasons. Users who are recognized by something other than their own identities or who maintain pseudo-anonymity are more common. Complete secrecy is challenging [24].

Integrity [P8]: Information must be accurate and unaltered by unauthorized parties while being transmitted [25].

3.1 Quantum Alternative (QA)

Developers choose QC algorithms that enable security for future advancements in computing [11]. QA1–QA10 are alternatives for estimating HSS. The details of QA are discussed below:

CRYSTALS-Kyber [QA1], the security of CRYSTALS-Kyber, an IND-CCA2-secure key encapsulation approach, is based on the difficulty of solving the learning-with-errors issue over module lattices. The quantum-safe CRYSTALS-Kyber method is a member of the CRYSTALS (Cryptographic Suite for Algebraic Lattices) family of algorithms. The intrinsic color stability factor is now backing Kyber-1024 Round 2. Advanced Encryption Standard (AES)-256 and Kyber-1024 both strive to be as secure as possible [26].

In Crystals-Dilithium [QA2], the grid-based digital signature architecture of Precious Stones dilithium makes it secure. This is because finding short vectors inside the lattice is difficult. The crystals dilithium digital signature algorithm belongs to the crystals family of algorithms. The size of a polynomial matrix in a crystals dilithium key affects its robustness. For instance, the matrix in crystals is 6 by 5: dilithium (6, 5). As the matrix size increases, the key strength rises. Only digital signatures can be generated and validated using crystals dilithium keys [27].

Falcon [QA3], the fourth standardization protocol, the digital signature algorithm SPHINCS+, was developed with the help of Ward Beullens, another current IBM scientist. Its foundation is the difficulty in obtaining short vectors in NTRU lattices. Dilithium and Falcon have complementary uses, despite being lattice-based digital signature techniques. Falcon has more limited characteristics, whereas dilithium is simpler to construct and use [28]. QC will be the next development in computation, increasing existing computer power to help solve difficult and complex problems. Although we are still developing and investigating the possibilities of quantum technology, we are aware that the two most popular encryption techniques currently in use are not secure against fault-tolerant universal quantum computers [29].

SPHINCS+ [QA4]: The most cautious signature system is SPHINCS+, which relies only on the reliability of the common hash algorithms. Depending on the SPHINCS+ variant used, this strong security assurance comes at the cost of either a fairly large signature size or a fairly long signing time. SPHINCS+ is very similar to the NIST-recommended and IETF-specified state full extended markel signature scheme. SPHINCS+ is ideal for wider use because, unlike XMSS, it is not state-full [30].

BIKE [QA5]: As BIKE employs only transient keys, a fresh key pair is created after every key exchange. Consequently, a GJS attack that depends on noticing numerous unsuccessful decoding attempts for the same private key is useless. We introduce three BIKE variants, referred to as BIKE-1, BIKE-2, and BIKE-3. Despite adhering to either the Niederreiter or McEliece framework, each version does so in significant ways [31].

HQC [QA6]: The Hamming quasi-cyclic (HQC) public-key encryption technique is based on the difficulty of decoding random quasi-cyclic codes in the Hamming metric. This design is similar to that of Alekhnovich’s cryptosystem, which uses ineffective random linear codes. Using repetition-code-tensed BCH codes, Aguilar et al. first suggested the HQC in 2016. In a later study by Aragon et al., the HQC-RMRS two-version, which combines the Reed-Muller and Reed-Solomon codes, was proposed. The NIST standardization process considers the IND-CCA2 KEM variation of HQC-RMRS. This version was produced by transforming the IND-CPA public-key encryption technique using the Fujisaki Okamoto (FO) transform [32].

GeMSS [QA7], an excellent multivariate signature scheme as its name implies, is a small-signature multivariate-based signature scheme. It has a rapid verification procedure and a medium-sized or large public key. GeMSS is a direct successor to QUARTZ and incorporates design ideas from the Gui multivariate signature scheme. The preceding schemes were constructed from the HFE cryptosystem using the so-called minus and vinegar modifiers or HFEv (HFE). It is reasonable to state that HFE and its variations are the most studied schemes in multivariate cryptography [33]. In the Nessie Encrypt competition for public-key signatures, QUARTZ was entered. It creates 128-bit signatures with an 80-bit security level. Unlike many other multivariate methods, QUARTZ has not been actively countered. This is remarkable in light of the lively multivariate scheme cryptanalysis. The most popular attacks used to configure GeMSS remain active. GeMSS is a faster variant of QUARTZ that employs the most recent advancements in multivariate cryptography to outperform QUARTZ while still achieving higher levels of security [34].

The innovative Picnic signature algorithm was built on Picnic [QA8], which uses zero-knowledge proofs rarely used in the real world. One of Picnic’s main architectural ideas, the MPC-in-the-head paradigm, allows cryptographers to quickly create zero-knowledge proofs from multi-party compute protocols. Using symmetric-key cryptography, a person using this signature system creates a key pair, separating the public key from the private key. The signer then adds their signature to the paper to demonstrate that they have the secret key. A verifier can then use the public key to confirm that the signer knows the secret key and that it is not a threat without the signer having to give up the private key. Except for a few of Picnic’s parameter sets [35], the entire process is non-interactive and has been proven to be safe in quantum RAM model 1.

SIKE [QA9]: SIKE is a KEM based on super-singular elliptic curve isogenies. The fundamental key agreement mechanism, Super-singular Isogeny Die Hellman (SIDH), is comparable to classical techniques, such as ECDH and DH, while additionally offering defense against quantum attacks. A fascinating characteristic of SIKE that makes it desirable for situations with constrained bandwidth or storage is that it has the smallest key and cipher text size of any NIST candidate. The main drawback is that it performed somewhat slowly compared to other candidates, which is also stated in the NIST report on contenders for the second round [36]. Therefore, SIKE prioritizes more optimized implementations. For SIKE, efficient implementations are already available for Intel x64, ARMv8-A, and ARMv7-M, and there has been some initial work on AVX512. The effective use of z15 vector instructions to quicken SIKE is of special interest to us [37].

Frodo KEM [QA10]: A family of postquantum key encapsulation systems known as FrodoKEM is both conservative and useful. The difficulty of the learning with errors (LWE) problem determines the security level. Thus, the LWE is connected to difficult problems in ” algebraically unstructured” lattices. The foundation of FrodoKEM is FrodoPKE, which is an LWE public-key encryption technique. The Learning with Errors problem, its hardness against quantum algorithms, and the development of an LWE-based public-key encryption scheme were introduced. FrodoPKE builds on Regev’s earlier work on LWE and is an improved version of the Lindner-Peikert scheme, which was first proposed in 2011. To achieve chosen-ciphertext (IND-CCA) security, FrodoKEM modifies the IND-CPA-secure FrodoPKE technique [38].

Multicriteria decision analyses are based on a hierarchy of factors and their dependence on alternatives. Quantitative analyses of the HSS estimation evaluate the weights and ranks of the factors and alternatives. The artificial approaches of the fuzzified AHP estimate the weights of the factors associated with the HSS, as shown in Figure 2. The artificial approach of the fuzzy TOPSIS evaluates the ranks of the associated alternatives.

4. Methodology

We used the hybrid neural approach of F-AHP and F-TOPSIS as soft computing tools for making decisions based on multiple criteria. The FAHP looks at the importance of each factor, while the F-TOPSIS looks at the importance of each alternative [6]. This strategy assesses the variables that affect the perspective of the HSS. The initial weighted values are based on a thorough assessment of the literature. We chose to fulfill our goals using a multi-model dynamic regular technique to assess the aspects associated with HSS. The F-AHP and F-TOPSIS hybrid approaches were used to assess and survey the component weights. F-TOPSIS provides the precise position of the variable relative to the other alternatives. The going with theory fuzzy system was used to accurately assess the items. We chose a soft-computing method to evaluate these factors quantitatively. One of the elements of the F-AHP and F-TOPSIS approaches is item evaluation. To improve the comprehension of the problems and the accuracy of the resources, numerous methodologies and assessment frameworks have been published in hard copies. However, F-AHP is the most effective multi-rule method for calculating the effect of an item’s health. However, F-AHP encounters certain difficulties [24]. To manage crossbreed F-AHP and F-TOPSIS, we merged the F-TOPSIS with a creative management strategy [39]. This unique approach makes it easier to assess the impact factor and its alternatives accurately.

4.1 Fuzzy AHP Methodology

These techniques determine the unmistakable productive assurance of problems involving influencing HSS using the F-AHP method.

It depends on the attributes and number of options that are most closely related to those attributes. The fuzzy numbers used to compare the F-AHP show how they are evaluated and ranked philologically [9]. Table 1 displays the corresponding fuzzy numbers for the comparison of the philological rankings. Figure 3 shows a fuzzy comparison measures (FCM) representation.

Subsequently, the F-AHP system assessed each substance submitted by the examiner. Subsequent improvements selected FCM from the hierarchical architecture. One metric assesses how a component and its selection affect various elective principles. Each variable had a pairwise relationship that acknowledged its importance to the whole (Figure 4). The following iteration of the F-AHP modifies the numerical value of the etymological phrases using fuzzy correlation measurements [23]. The heaviness of the pieces was determined using the FAHP technique. These approaches are described in detail as follows:

Step 1: To encourage participation and enrolment, work is based on a three-sided fuzzy number that spreads the yes or no justification among several sub-values in Table 1, as illustrated in Condition 1.

μa(x)=a[0,1],

As illustrated in Figure 4, choose or consider “l,” the lowest value, “mi,” the middle value, and “u,” the highest quality.

Step 2: We translated the phonetic phrases into FCM esteem after assessing their surroundings. A numerical mathematical mean test was applied to assess FCM. The mathematical mean was used to assess the critical outcomes between the components.

Step 3: Next, we considered the two-layered investigation system for the fuzzy pairwise examination lattice.

Ad˜=[k˜11dk˜12dk˜1nd,k˜21dk˜22dk˜2nd,,k˜n1dk˜n2dk˜nnd],k˜ij=i=1dk˜ijd,

where kijk˜ mentioned leader is on both the condition ith over jth in Conditions 2 and 3. If the inclination is multiple, the typical qualities are chosen.

Step 4: Expanding the order of the relevant components, typical trends were assessed. In a stepping stool based on preferences, paired assessment networks were built for each of the influential viewpoints from Situation 4.

A˜=k11˜k1n˜,,kn1˜k˜nn.

Step 5: Scenario 5 presents the mathematical mean method and calculates the fuzzy load and mathematical mean for each element. Scenario 6 shows the method used to determine fuzzy variable load.

p˜i=(j=1nk˜ij)1n,i=1,2,3,,n,w˜i=p˜i(p˜1p˜2p˜3p˜n)-1.

Step 6: Standardized weight models for scenarios 7 and 8 were determined and assessed.

Mi=w˜1w˜2w˜nn,Nri=MM1M2Mn.

Step 7: The next stage involved selecting the finest non-fuzzy presentation. This section discusses the best non-fuzzy performance (BNP), which acts as the focal point of region strategies. The link and effect of the fuzzy loads across all metrics were determined using Situation 9.

BNPwD1=[(uw1-lw1)+(miw1-lw1)]3+lw1.

4.2 Fuzzy Technique for Order of Preference by Similarity to Ideal Solution

The m alternative in geometrical arrangement with m points and n-dimensional area The TOPSIS methodology is used in multi-criteria decision selection for ranking. The core of the TOPSIS approach is the notion of the enduring and most remote distance from the positive ideal solution and the negative ideal solution for the most favorable and minimal ideal solution, respectively [40]. The TOPSIS approach significantly simplifies the process of assigning the appropriate position to the alternative and the factor concerning the criterion. To create uniformity in a fuzzy environment and indicate the importance of the criteria, TOPSIS assigns fuzzy numbers based on preference.

  • • Create a fuzzy decision matrix.

  • • Normalize the fuzzy decision matrix.

  • • Create a quantified fuzzy normalized decision matrix.

  • • Evaluate and define FPIS, FNIS.

  • • Evaluate the closeness coefficient.

The fuzzy decision matrix is created using Eq. (10).

K˜=C1                  CnA1Am[x˜11x˜1nx˜m1x˜mn].

Here, x˜ij=1D(x˜ij1x˜ijdx˜ijD),x˜ijd-the developer or practitioner makes an educated guess regarding the alternative Ai performance rating about the factor CJ estimated by the dth developer x˜ijd=(lijd,miijd,uijd).

Calculate the normalization of the fuzzy decision matrix using Eq. (11), which can be used for the normalized fuzzy decision matrix. The normalizing procedure was evaluated using Eq. (12):

P˜=[p˜ij]m×n,p˜ij=(lijuj+,miijuj+,uijuj+),uj+=max{uij,i=1,2,3,,n}.

The intended highest level uj+, where j = 1, 2, and so on. The worst case is 0 if n is greater than 1. FCM remained the accepted ij. For the FCM, the normalization process can be performed in the same manner. A quantified fuzzy normalized decision matrix () should be created. To calculate the weighted normalized fuzzy decision matrix, we use Eq. (13):

Q˜=[q˜ij]m×n,i=1,2,,m;   j=1,2,3,,n,

where ij = ijij.

The components ij are normalized positive FCM, and the weighted normalized fuzzy decision matrix shows that their range lies within a narrow interval [0, 1].

By assessing and defining fuzzy positive ideal solution (FPIS) and fuzzy negative ideal solution (FNIS), the FPIS A+ (aspiration levels) and the FNIS A are shown in Eqs. (14) and (15), respectively.

A+=(q˜1*,,q˜j*,,q˜n*),A-1=(q˜1*,,q˜j*,,q˜n*).

q˜1*=(1,1,1)w˜ij=(Lwj,Mwj,Hwj) and q˜ij-=(0,0,0), j = 1, 2, 3, …, n.

Applying the area compensation approach, as shown in Eqs. (16) and (17), the difference between each alternative and FPIS and FNIS is given by d˜i+ and d˜i- the difference between each alternative, and A+ and A− are given by the equations.

d˜i+=j=1nd(q˜ij,q˜ij*),i=1,2,,m;j=1,2,,n,d˜i-=j=1nd(q˜ij,q˜ij*),i=1,2,,m;j=1,2,,n.
Check the closeness coefficient

The degree of relative gaps is represented by the closeness coefficient (CC̃i), which can be determined using Eq. (18). The CC combines the selections to obtain the appropriate levels for each element. The closeness coefficient, which is employed to recover the alternatives, determines their estimation and fuzzy gap of alternatives. Each alternative was assessed and a comparison to the optimum solution was estimated.

CC˜i=k˜i-k˜i++k˜i-=1-k˜i+k˜i++ki-,i=1,2,,m.

Here, k˜i-k˜i++k˜i-– the first alternative’s fuzzy satisfaction degree-is specified as ith alternative, and k˜i+k˜i++k˜i-

– is defined as the fuzzy gap degree in the ith alternative. The alternatives were ranked using the F-TOPSIS method and approach.

5. Data Analysis

F-AHP is a hybrid soft-computing method that combines F-AHP and F-TOPSIS. This gives the weight of each influencing factor from P1 to P8. From QA1 to QA10, the F-TOPSIS technique ranked the choices. The majority of the time, subjective assessment is adequate for determining how the HSS factors will affect things. It is challenging to quantitatively evaluate HSS. Although a property of order at one level affects one or more qualities at a more significant level, the effects are not the same, as shown in Figure 4. Things might vary. To evaluate this, we converted the aggregated qualities into chains of importance.

Table 2 lists the different security risks P1 to P8, and their FCM weights and BNP are listed in Table 3.

Tables 57 display the various values of the subjective cognition results described in the equations, normalized fuzzy decision matrix, and weighted normalized decision matrix, respectively. These values were obtained using the F-TOPSIS approach.

The F-TOPSIS equation in Table 8 indicates the degree of closeness. The various HSS properties were comparable. According to expert judgment and data, the factors (P1 through P8) and attributes (QA1 through QA10) of the HSS are in satisfactory condition pert judgment and data, the factors (P1 through P8) and attributes (QA1 through QA10) of the HSS are in satisfactory condition. Figure 5 shows the degree of proximity.

6. Comparison of HS Security with Classical AHP-TOPSIS method

The same data, results, and output differ when different methodologies are applied. This guaranteed the effectiveness and dependability of the method [22]. In this study, we evaluated the efficacy and precision of the outcome using the F-AHPTOPSIS approach. AHP-TOPSIS uses the same data collection and estimation techniques as fuzzy AHP-TOPSIS; however, no fuzzifications are applied [39]. As a result, for the classic AHP-TOPSIS, the values are taken in their real number form. The distinction between the conventional and fuzzy AHP-TOPSIS results is presented in Table 8 and Figure 6. The results of the F-AHPTOPSIS method and those from the traditional AHPTOPSIS approach had a Pearson correlation coefficient of 0.999176. The F-AHP and F-TOPSIS procedures and methods were superior to the second technique in terms of effectiveness.

7. Sensitivity Analysis

Using the sensitivity analyses [41, 42] shown in Table 9, the results were checked as each variable was changed. Sensitivity analysis was performed based on the variables’ weights [43]. Several experiments for each factor with the same number of participants were conducted in our HSS-based investigation to confirm the sensitivity analyses [44, 45]. The satisfaction level (CC-i) was computed using the F-AHPTOSIS method by calculating the weight of each factor (P1–P8 as a constant). The results of the sensitivity analyses are presented in Table 9. The first rows of Table 9 and Figure 7 display the initial weights, whereas Figure 6 displays the first collection of data. According to the initial weights and outcomes, Factor-8 (P1–P8) had a high level of satisfaction (CC-i). Ten experiments were conducted, from QA1 to QA10. The findings of eight studies showed that Factor-8 (P1–P8) still had a high degree of pleasure (CC-i). P2 was also a factor in each experiment and was assigned the least weight. The different correlations between the data show that alternative ratings are weight dependent [46, 47].

8. Conclusion

Software is becoming increasingly complicated and important in everyday life. However, the main reason why there are so many more data breaches is that there is insufficient security infrastructure that is easy to use. Dominion National, an insurance company, found a nine-year attack on its servers that could have put the personal information of 2.96 million patients at risk. These infractions have led to the theft or exposure of more than 189 million healthcare documents. Therefore, there is an urgent need to evaluate the security of software products using high-quality methods built in. The goal of this investigation was to calculate HSS. To this end, a case study was conducted on six hospital management software companies. To fulfill its goals, this study used ten alternatives in addition to eight security attributes at level I, namely QA1 to QA10, which include QA1, QA2, QA3, QA4, QA5, QA6, QA7, QA8, QA9, and QA10.

The results of this empirical investigation will help experts create software with the correct level of security. Several security models each estimate security in various ways. Nevertheless, few security model options are available for a single product. Furthermore, only a small percentage employ TOPSIS, F-AHP, or other multi-criteria decision-making techniques. The authors used the unified fuzzy AHP-TOPSIS of the MCDM. Fuzzy logic is particularly adept at resolving ambiguous and imprecise information in decision-making challenges; this property of the AHP properly portrays real-world problems and yields better solutions. In addition, TOPSIS supports the selection of the best option from the given options by effectively categorizing alternatives. To attain the best outcomes compared to other MCDM approaches, this study used the combined fuzzy AHP-TOPSIS. According to the findings of this study, the QA6 program provided the highest level of security and user satisfaction among the ten alternatives. The highlights of our study are listed below along with a summary of the results.

Pros: Secure HSS apps can assist programmers and designers in producing superior programs that can completely please users.

  • • With the help of the F-AHP-derived results of this study, practitioners can group qualities into groups and choose security design options when making software products.

  • • This will provide software products with long-lasting security.

  • • Security is a significant problem in the quantum world that is currently unaddressed. This study will serve as the gold standard for app developers to gain a thorough understanding of security architecture.

Changing validity:

  • • Finding and choosing attributes for security assessment is neither ideal nor definitive. The number of attributes or specific sets of qualities may have affected the results. Although MCDM techniques may be more suitable for MCDM issues, the combined fuzzy AHP-TOPSIS is a useful tool for security evaluations.

  • • In conclusion, this study employed an integrated fuzzy AHP-TOPSIS methodology to assess HSS security.

The powerful fuzzy AHP-TOPSIS Integrated method can be used to evaluate any MCDM problem with numerous parts and options, such as security assessments. Using a quantum computer, we calculated the security factors and estimated the HSS. The necessary weight variables were also assessed. The most recent evaluation of options using TOPSIS was tested for each of the open security options QA1–QA10 (QA6 > QA8 > QA7 > QA9 > QA5 > QA4 > QA10 > QA3 > QA1 > QA2). It was determined that QA-6, the alternative, offered the best possible health and user happiness. The proposed assessment approach enables an HSS to produce high-quality goods for systems with an anticipated level of security.

Fig 1.

Figure 1.

Graphical representation of security issues in the healthcare sector (2020–2022).

The International Journal of Fuzzy Logic and Intelligent Systems 2023; 23: 336-352https://doi.org/10.5391/IJFIS.2023.23.3.336

Fig 2.

Figure 2.

Hierarchical structure of the factors and alternatives.

The International Journal of Fuzzy Logic and Intelligent Systems 2023; 23: 336-352https://doi.org/10.5391/IJFIS.2023.23.3.336

Fig 3.

Figure 3.

Radar representation of FCM.

The International Journal of Fuzzy Logic and Intelligent Systems 2023; 23: 336-352https://doi.org/10.5391/IJFIS.2023.23.3.336

Fig 4.

Figure 4.

Fuzzy comparison measures.

The International Journal of Fuzzy Logic and Intelligent Systems 2023; 23: 336-352https://doi.org/10.5391/IJFIS.2023.23.3.336

Fig 5.

Figure 5.

Degree of closeness IoMT.

The International Journal of Fuzzy Logic and Intelligent Systems 2023; 23: 336-352https://doi.org/10.5391/IJFIS.2023.23.3.336

Fig 6.

Figure 6.

Comparison of quantum algorithm as an alternative with the fuzzified and non-fuzzified approach.

The International Journal of Fuzzy Logic and Intelligent Systems 2023; 23: 336-352https://doi.org/10.5391/IJFIS.2023.23.3.336

Fig 7.

Figure 7.

Graphical representation of sensitivity analysis.

The International Journal of Fuzzy Logic and Intelligent Systems 2023; 23: 336-352https://doi.org/10.5391/IJFIS.2023.23.3.336

Table 1 . Fuzzy comparison measures (FCM).

Linguistic termsFCM
Equal(1, 1, 1)
Not bad(2, 3, 4)
Good(4, 5, 6)
Very good(6, 7, 8)
Perfect(9, 9, 9)
Weak advantage(1, 2, 3)
Preferable(3, 4, 5)
Fairly good(5, 6, 7)
Absolute(7, 8, 9)

Table 2 . Fuzzy AHP aggregated pair wise matrix.

P1P2P3P4P5P6P7P8
P11, 1, 10.9, 1.1, 1.41.2, 1.5, 1.70.9, 1, 1.12.1, 2.9, 3.81.1, 1.3, 1.62.1, 2.9, 3.80.9, 1.1, 1.4
P20.7, 0.9, 1.11, 1, 11.1, 1.6, 1.91.8, 1.9, 2.12.7, 3.4, 42.1, 2.7, 3.22.7, 3.4, 41, 1, 1
P30.6, 0.7, 0.80.5, 0.6, 0.91, 1, 11.4, 1.6, 1.91.7, 2.2, 2.91.7, 2.1, 2.61.7, 2.2, 2.90.5, 0.6, 0.9
P40.9, 1, 1.20.5, 0.55, 0.60.5, 0.6, 0.71, 1, 11.9, 2.5, 2.71.6, 2.5, 2.61.9, 2.5, 2.70.5, 0.55, 0.6
P50.3, 0.3, 0.50.3, 0.35, 0.40.3, 0.5, 0.70.3, 0.4, 0.51, 1, 11, 1.1, 1.31, 1, 10.3, 0.35, 0.4
P60.7, 0.8, 10.3, 0.4, 0.50.4, 0.5, 0.60.4, 0.5, 0.60.8, 0.9, 1.11, 1, 10.8, 0.9, 1.10.3, 0.4, 0.5
P72.1, 2.9, 3.82.7, 3.4, 41.7, 2.2, 2.91.9, 2.5, 2.71, 1, 10.8, 0.9, 1.11, 1, 12.7, 3.4, 4
P80.9, 1.1, 1.41, 1, 10.5, 0.6, 0.90.5, 0.55, 0.60.5, 0.55, 0.60.3, 0.35, 0.40.3, 0.4, 0.51, 1, 1

Table 3 . Weights of factors.

FactorsWeightsBNPRank
P10.15, 0.18, 0.210.162
P20.19, 0.2, 0.220.191
P30.13, 0.16, 0.190.154
P40.12, 0.15, 0.180.163
P50.06, 0.08, 0.10.078
P60.07, 0.09, 0.130.096
P70.08, 0.1, 0.130.15
P80.05, 0.08, 0.120.087

Table 4 . Subjective cognition results.

Factors/AlternativesQA1QA2QA3QA4QA5QA6QA7QA8QA9QA10
P15, 7, 8.94.4, 6.4, 8.44.4, 6.4, 8.32.6, 4.6, 6.64.4, 6.4, 8.44.4, 6.4, 8.32.6, 4.6, 6.64.4, 6.4, 8.44.4, 6.4, 8.32.6, 4.6, 6.6
P25.2, 7.2, 94.6, 6.6, 8.63.8, 5.8, 7.72.6, 4.6, 6.64.6, 6.6, 8.63.8, 5.8, 7.72.6, 4.6, 6.64.6, 6.6, 8.63.8, 5.8, 7.72.6, 4.6, 6.6
P34.6, 6.6, 8.63.6, 5.6, 7.64, 6, 7.93, 5, 73.6, 5.6, 7.64, 6, 7.93, 5, 73.6, 5.6, 7.64, 6, 7.93, 5, 7
P45.6, 7.6, 9.24.8, 6.8, 8.74.6, 6.6, 8.43.2, 5.2, 7.24.8, 6.8, 8.74.6, 6.6, 8.43.2, 5.2, 7.24.8, 6.8, 8.74.6, 6.6, 8.43.2, 5.2, 7.2
P54.8, 6.8, 8.74, 6, 83.8, 5.8, 7.82.6, 4.6, 6.64, 6, 83.8, 5.8, 7.82.6, 4.6, 6.64, 6, 83.8, 5.8, 7.82.6, 4.6, 6.6
P65, 7, 94.4, 6.4, 8.44.2, 6.2, 8.12.5, 4.4, 6.44.4, 6.6, 8.44.2, 6.2, 8.12.5, 4.4, 6.44.4, 6.6, 8.44.2, 6.2, 8.12.5, 4.4, 6.4
P74.6, 6.6, 8.63.6, 5.6, 7.64, 6, 7.93, 5, 73.6, 5.6, 7.64, 6, 7.93, 5, 73.6, 5.6, 7.64, 6, 7.93, 5, 7
P85.6, 7.6, 9.24.8, 6.8, 8.74.6, 6.6, 8.43.2, 5.2, 7.24.8, 6.8, 8.74.6, 6.6, 8.43.2, 5.2, 7.24.8, 6.8, 8.74.6, 6.6, 8.43.2, 5.2, 7.2

Table 5 . Normalized fuzzy-decision matrix.

Factors/AlternativesQA1QA2QA3QA4QA5QA6QA7QA8QA9QA10
P10.54, 0.76, 0.970.48, 0.7, 0.90.48, 0.7, 0.90.28, 0.50, 0.720.48, 0.7, 0.90.48, 0.7, 0.90.28, 0.50, 0.720.48, 0.7, 0.90.48, 0.7, 0.90.28, 0.50, 0.72
P20.57, 0.78, 0.980.5, 0.72, 0.940.41, 0.63, 0.840.28, 0.50, 0.720.5, 0.72, 0.940.41, 0.63, 0.840.28, 0.50, 0.720.5, 0.72, 0.940.41, 0.63, 0.840.28, 0.50, 0.72
P30.5, 0.72, 0.940.39, 0.61, 0.830.44, 0.65, 0.860.33, 0.54, 0.760.39, 0.61, 0.830.44, 0.65, 0.860.33, 0.54, 0.760.39, 0.61, 0.830.44, 0.65, 0.860.33, 0.54, 0.76
P40.61, 0.83, 10.52, 0.74, 0.950.5, 0.72, 0.940.35, 0.57, 0.780.52, 0.74, 0.950.5, 0.72, 0.940.35, 0.57, 0.780.52, 0.74, 0.950.5, 0.72, 0.940.35, 0.57, 0.78
P50.52, 0.74, 0.950.44, 0.65, 0.860.41, 0.63, 0.850.28, 0.50, 0.720.44, 0.65, 0.860.41, 0.63, 0.850.28, 0.50, 0.720.44, 0.65, 0.860.41, 0.63, 0.850.28, 0.50, 0.72
P60.54, 0.76, 0.980.48, 0.7, 0.90.46, 0.67, 0.880.27, 0.48, 0.70.48, 0.7, 0.90.46, 0.67, 0.880.27, 0.48, 0.70.48, 0.7, 0.90.46, 0.67, 0.880.27, 0.48, 0.7
P70.5, 0.72, 0.940.39, 0.61, 0.830.44, 0.65, 0.860.33, 0.54, 0.760.39, 0.61, 0.830.44, 0.65, 0.860.33, 0.54, 0.760.39, 0.61, 0.830.44, 0.65, 0.860.33, 0.54, 0.76
P80.61, 0.83, 10.52, 0.74, 0.950.5, 0.72, 0.940.35, 0.57, 0.780.52, 0.74, 0.950.5, 0.72, 0.940.35, 0.57, 0.780.52, 0.74, 0.950.5, 0.72, 0.940.35, 0.57, 0.78

Table 6 . Weighted normalized fuzzy-decision matrix.

Factors/AlternativesQA1QA2QA3QA4QA5QA6QA7QA8QA9QA10
P10.08, 0.16, 0.280.07, 0.15, 0.260.07, 0.15, 0.260.04, 0.10, 0.210.07, 0.15, 0.260.07, 0.15, 0.260.04, 0.10, 0.210.07, 0.15, 0.260.07, 0.15, 0.260.04, 0.10, 0.21
P20.11, 0.20, 0.350.09, 0.19, 0.340.08, 0.16, 0.300.05, 0.13, 0.260.09, 0.19, 0.340.08, 0.16, 0.300.05, 0.13, 0.260.09, 0.19, 0.340.08, 0.16, 0.300.05, 0.13, 0.26
P30.07, 0.13, 0.250.05, 0.11, 0.220.06, 0.12, 0.230.04, 0.10, 0.210.05, 0.11, 0.220.06, 0.12, 0.230.04, 0.10, 0.210.05, 0.11, 0.220.06, 0.12, 0.230.04, 0.10, 0.21
P40.08, 0.14, 0.230.07, 0.13, 0.220.06, 0.12, 0.210.04, 0.10, 0.180.07, 0.13, 0.220.06, 0.12, 0.210.04, 0.10, 0.180.07, 0.13, 0.220.06, 0.12, 0.210.04, 0.10, 0.18
P50.03, 0.06, 0.110.03, 0.05, 0.100.02, 0.05, 0.100.02, 0.04, 0.090.03, 0.05, 0.100.02, 0.05, 0.100.02, 0.04, 0.090.03, 0.05, 0.100.02, 0.05, 0.100.02, 0.04, 0.09
P60.04, 0.07, 0.130.03, 0.07, 0.120.03, 0.06, 0.120.02, 0.05, 0.090.03, 0.07, 0.120.03, 0.06, 0.120.02, 0.05, 0.090.03, 0.07, 0.120.03, 0.06, 0.120.02, 0.05, 0.09
P70.07, 0.13, 0.250.05, 0.11, 0.220.06, 0.12, 0.230.04, 0.10, 0.210.05, 0.11, 0.220.06, 0.12, 0.230.04, 0.10, 0.210.05, 0.11, 0.220.06, 0.12, 0.230.04, 0.10, 0.21
P80.08, 0.14, 0.230.07, 0.13, 0.220.06, 0.12, 0.210.04, 0.10, 0.180.07, 0.13, 0.220.06, 0.12, 0.210.04, 0.10, 0.180.07, 0.13, 0.220.06, 0.12, 0.210.04, 0.10, 0.18

Table 7 . Closeness coefficients to aspired level among different alternatives.

dbidiGaps degree of CCipSatisfaction degree of CCi
QA10.240.490.670.33
QA20.820.90.780.22
QA30.270.510.650.35
QA40.320.480.60.4
QA50.420.610.590.41
QA60.270.30.520.48
QA70.30.420.580.42
QA80.420.530.550.45
QA90.290.420.590.41
QA100.30.580.650.35

Table 8 . The result of the usual/classical method and F-AHP and F-TOPSIS method.

Methods/AlternativesQA1QA2QA3QA4QA5QA6QA7QA8QA9QA10
Fuzzy-AHP-TOPSIS0.3312000.2224000.3525000.4055000.4147000.4849000.4256000.4551000.4161000.358900
Classical-AHP-TOPSIS0.3256000.2225000.3561000.4058000.4156000.4858000.4298000.4660000.4089000.347800

Table 9 . Sensitivity analysis.

ExperimentsWeights/AlternativesSatisfaction degree (CC-i)QA1QA2QA3QA4QA5QA6QA7QA8QA9QA10
Exp-0Original weights0.33120.22240.35250.40550.41470.48490.42560.45510.41610.3589
Exp-1P10.35230.23750.36710.42130.42060.49630.431790.4710.42940.36979
Exp-2P20.330.22750.35410.40980.41110.49580.42680.46150.42890.3648
Exp-3P30.33360.2220.36110.40380.40660.49430.42380.4570.42740.3618
Exp-4P40.34260.04450.34850.39390.41580.48530.42710.46620.41840.3651
Exp-5P50.30380.18990.31530.37860.37420.45650.39210.42460.38960.3301
Exp-6P60.25650.14090.27050.33530.32780.41280.40480.37820.34590.3428
Exp-7P70.34830.22780.36030.42820.4160.50150.43480.46640.43460.3728
Exp-8P80.33290.23950.35810.41380.42290.48640.42880.47330.41950.3668

References

  1. Agyepong, E, Cherdantseva, Y, Reinecke, P, and Burnap, P (2023). A systematic method for measuring the performance of a cyber security operations centre analyst. Computers & Security. 124. article no 102959
    CrossRef
  2. Esnoul, C, Colomo-Palacios, R, Jee, E, Chockalingam, S, Eidar Simensen, J, and Bae, DH (2023). Report on the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS-2022). ACM SIGSOFT Software Engineering Notes. 48, 81-84. https://doi.org/10.1145/3573074.3573095
    CrossRef
  3. Al Madi, N, Busjahn, T, and Sharif, B (2023). Summary of the Tenth International Workshop on Eye Movements in Programming (EMIP 2022). ACM SIGSOFT Software Engineering Notes. 48, 79-80. https://doi.org/10.1145/3573074.3573094
    CrossRef
  4. Chowdhury, N, and Gkioulos, V (2021). Cyber security training for critical infrastructure protection: a literature review. Computer Science Review. 40. article no 100361
    CrossRef
  5. Hadi, HJ, Cao, Y, Nisa, KU, Jamil, AM, and Ni, Q (2023). A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs. Journal of Network and Computer Applications. 213. article no 103607
    CrossRef
  6. Nadeem, M, Al-Amri, JF, Subahi, AF, Seh, AH, Khan, SA, Agrawal, A, and Khan, RA (2022). Multi-level hesitant fuzzy based model for usable-security assessment. Intelligent Automation & Soft Computing. 31. article no 103304
    CrossRef
  7. Alzahrani, FA, Ahmad, M, Nadeem, M, Kumar, R, and Khan, RA (2021). Integrity assessment of medical devices for improving hospital services. Computer, Materials & Continua. 67, 3619-3633. https://doi.org/10.32604/cmc.2021.014869
    CrossRef
  8. Pustokhina, IV, Pustokhin, DA, Gupta, D, Khanna, A, Shankar, K, and Nguyen, GN (2020). An effective training scheme for deep neural network in edge computing enabled Internet of Medical Things (IoMT) systems. IEEE Access. 8, 107112-107123. https://doi.org/10.1109/ACCESS.2020.3000322
    CrossRef
  9. Alyami, H, Nadeem, M, Alosaimi, W, Alharbi, A, Kumar, R, Gupta, BK, Agrawal, A, and Khan, RA (2022). Analyzing the data of software security life-span: quantum computing era. Intelligent Automation & Soft Computing. 31, 707-716. https://doi.org/10.32604/iasc.2022.020780
    CrossRef
  10. Li, J, Li, B, Wo, T, Hu, C, Huai, J, Liu, L, and Lam, KP (2012). CyberGuarder: a virtualization security assurance architecture for green cloud computing. Future Generation Computer Systems. 28, 379-390. https://doi.org/10.1016/J.FUTURE.2011.04.012
    CrossRef
  11. Arute, F, Arya, A, Babbush, R, Bacon, D, Bardin, JC, and Barends, R (2019). Quantum supremacy using a programmable superconducting processor. Nature. 574, 505-510. https://doi.org/10.1038/s41586-019-1666-5
    Pubmed CrossRef
  12. Bhavin, M, Tanwar, S, Sharma, N, Tyagi, S, and Kumar, N (2021). Blockchain and quantum blind signature-based hybrid scheme for healthcare 5.0 applications. Journal of Information Security and Applications. 56. article no 102673
    CrossRef
  13. Sanavio, C, Tignone, E, and Ercolessi, E. (2023) . Entanglement classification via witness operators generated by support vector machine. Available: https://doi.org/10.48550/arxiv.2301.06759
  14. Ur Rasool, R, Ahmad, HF, Rafique, W, Qayyum, A, and Qadir, J. (2021) . Quantum computing for healthcare: a review. Available: https://dx.doi.org/10.36227/techrxiv.17198702.v2
  15. Davids, J, Nidstromer, L, and Ashrafian, H (2022). Artificial intelligence in medicine using quantum computing in the future of healthcare. Artificial Intelligence in Medicine. Cham, Germany: Springer, pp. 423-446 https://doi.org/10.1007/978-3-030-64573-1_338
  16. Malviya, R, and Sundram, S (2022). Exploring potential of quantum computing in creating smart healthcare. The Open Biology Journal. 9, 56-57. https://doi.org/10.2174/187419670210901005
    CrossRef
  17. Niraula, D, Jamaluddin, J, Pakela, J, and El Naqa, I (2022). Quantum computing for machine learning. Machine and Deep Learning in Oncology, Medical Physics and Radiology. Cham: Springer, pp. 79-102 https://doi.org/10.1007/978-3-030-83047-2_5
    CrossRef
  18. Solenov, D, Brieler, J, and Scherrer, JF (2018). The potential of quantum computing and machine learning to advance clinical research and change the practice of medicine. Missouri Medicine. 115, 463-467.
    Pubmed KoreaMed
  19. Perumal, AM, and Nadar, ERS (2021). Architectural framework and simulation of quantum key optimization techniques in healthcare networks for data security. Journal of Ambient Intelligence and Humanized Computing. 12, 7173-7180. https://doi.org/10.1007/s12652-020-02393-1
    CrossRef
  20. Qu, Z, and Sun, H (2022). A Secure Information Transmission Protocol for Healthcare Cyber Based on Quantum Image Expansion and Grover Search Algorithm. IEEE Transactions on Network Science and Engineering. https://doi.org/10.1109/TNSE.2022.3187861
  21. Kumar, PS (2016). A simple method for solving type-2 and type-4 fuzzy transportation problems. International Journal of Fuzzy Logic and Intelligent Systems. 16, 225-237. https://doi.org/10.5391/IJFIS.2016.16.4.225
    CrossRef
  22. Alharbi, A, Faizan, M, Alosaimi, W, Alyami, H, Nadeem, M, Khan, SA, Agrawal, A, and Khan, RA (2021). A link analysis algorithm for identification of key hidden services. Computers, Materials & Continua. 68, 877-886. https://doi.org/10.32604/cmc.2021.016887
    CrossRef
  23. Alenezi, M, Nadeem, M, Agrawal, A, Kumar, R, and Khan, RA (2020). Fuzzy multi criteria decision analysis method for assessing security design tactics for web applications. International Journal of Intelligent Engineering & Systems. 13, 181-196. https://doi.org/10.22266/ijies2020.1031.17
    CrossRef
  24. Alyami, H, Nadeem, M, Alharbi, A, Alosaimi, W, Ansari, MTJ, Pandey, D, Kumar, R, and Khan, RA (2021). The evaluation of software security through quantum computing techniques: a durability perspective. Applied Sciences. 11. article no 11784
    CrossRef
  25. Aguado, A, Lopez, V, Martinez-Mateo, J, Szyrkowiec, T, Autenrieth, A, Peev, M, Lopez, D, and Martin, V (2017). Hybrid conventional and quantum security for software defined and virtualized networks. Journal of Optical Communications and Networking. 9, 819-825. https://doi.org/10.1364/JOCN.9.000819
    CrossRef
  26. Bos, J, Ducas, L, Kiltz, E, Lepoint, T, Lyubashevsky, V, Schanck, JM, Schwabe, P, Seiler, G, and Stehle, D . CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM., Proceedings of 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 2018, London, UK, Array, pp.353-367. https://doi.org/10.1109/EuroSP.2018.00032
  27. Sailada, S, Nohra, V, and Subramanian, N . Crystal dilithium algorithm for post quantum cryptography: experimentation and Usecase for eSign., Proceedings of 2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT), 2022, Trichy, India, Array, pp.1-6. https://doi.org/10.1109/ICEEICT53079.2022.9768654
  28. Riel, H . Quantum computing technology., Proceedings of 2021 IEEE International Electron Devices Meeting (IEDM), 2021, San Francisco, CA, Array, pp.1-3. https://doi.org/10.1109/IEDM19574.2021.9720538
  29. Fadillah, MHAZ, Idrus, B, Hasan, MK, and Mohd, SM . Impact of various IBM Quantum architectures with different properties on Grover’s algorithm., Proceedings of 2021 International Conference on Electrical Engineering and Informatics (ICEEI), 2021, Kuala Terengganu, Malaysia, Array, pp.1-6. https://doi.org/10.1109/ICEEI52609.2021.9611142
  30. Kumar, M (2022). Post-quantum cryptography Algorithm’s standardization and performance analysis. Array. 15. article no 100242
    CrossRef
  31. Kostic, D 2020. Analysis of the BIKE post-quantum cryptographic protocols and the Legendre pseudorandom function. Master’s thesis. École polytechnique fédérale de Lausanne (EPFL). Lausanne, Switzerland. https://doi.org/10.5075/EPFL-THESIS-7212
  32. Giuntini, R, Holik, F, Park, DK, Freytes, H, Blank, C, and Sergioli, G (2023). Quantum-inspired algorithm for direct multi-class classification. Applied Soft Computing. 134. article no 109956
    CrossRef
  33. Garcia Cid, MI, Alvaro Gonzalez, J, Ortiz Martín, L, and Del Rio Gomez, D . Disruptive quantum safe technologies., Proceedings of the 17th International Conference on Availability, Reliability and Security, 2022, Vienna, Austria, Array, pp.1-8. https://doi.org/10.1145/3538969.3544484
  34. Raavi, M, Wuthier, S, Chandramouli, P, Balytskyi, Y, Zhou, X, and Chang, SY (2021). Security comparisons and performance analyses of post-quantum signature algorithms. Applied Cryptography and Network Security. Cham, Switzerland: Springer, pp. 424-447 https://doi.org/10.1007/978-3-030-78375-4_17
  35. Kurariya, P, Bhargava, A, Sailada, S, Subramanian, N, Bodhankar, J, and Kumar, A . Experimentation on Usage of PQC Algorithms for eSign., Proceedings of 2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA), 2022, Bangalore, India, Array, pp.1-6. https://doi.org/10.1109/PKIA56009.2022.9952354
  36. Grassl, M, Langenberg, B, Roetteler, M, and Steinwandt, R (2016). Applying Grover’s algorithm to AES: quantum resource estimates. Post-Quantum Cryptography. Cham, Switzerland: Springer, pp. 29-43 https://doi.org/10.1007/978-3-319-29360-8_3
    CrossRef
  37. Bradbury, J, and Hess, B. (2021) . Fast quantum-safe cryptography on IBM Z. Available: https://csrc.nist.gov/Presentations/2021/fast-quantum-safe-cryptography-on-ibm-z
  38. Howe, J, Martinoli, M, Oswald, E, and Regazzoni, F (2021). Exploring parallelism to improve the performance of frodokem in hardware. Journal of Cryptographic Engineering. 11, 317-327. https://doi.org/10.1007/s13389-021-00258-7
    CrossRef
  39. Alassery, F, Alzahrani, A, Khan, AI, Khan, A, Nadeem, M, and Ansari, MTJ (2022). Quantitative evaluation of mental-health in type-2 diabetes patients through computational model. Intelligent Automation & Soft Computing. 32, 1701-1715. https://doi.org/10.32604/IASC.2022.023314
    CrossRef
  40. Nadaban, S, Dzitac, S, and Dzitac, I (2016). TOPSIS Fuzzy: a general view. Procedia Computer Science. 91, 823-831. https://doi.org/10.1016/j.procs.2016.07.088
    CrossRef
  41. Khan, SA, Nadeem, M, Agrawal, A, Khan, RA, and Kumar, R (2021). Quantitative analysis of software security through fuzzy PROMETHEE-II methodology: a design perspective. International Journal of Modern Education & Computer Science. 13, 30-41. https://doi.org/10.5815/ijmecs.2021.06.04
    CrossRef
  42. Kumar, PS (2022). Computationally simple and efficient method for solving real-life mixed intuitionistic fuzzy 3D assignment problems. International Journal of Software Science and Computational Intelligence (IJSSCI). 14, 1-42. http://doi.org/10.4018/IJSSCI.291715
    CrossRef
  43. Kumar, PS (2020). Developing a new approach to solve solid assignment problems under intuitionistic fuzzy environment. International Journal of Fuzzy System Applications (IJFSA). 9, 1-34. http://doi.org/10.4018/IJFSA.2020010101
    CrossRef
  44. Ahmad, A, Saad, M, Al Ghamdi, M, Nyang, D, and Mohaisen, D (2022). BlockTrail: a service for secure and transparent blockchain-driven audit trails. IEEE Systems Journal. 16, 1367-1378. https://doi.org/10.1109/JSYST.2021.3097744
    CrossRef
  45. Darwish, MA, Yafi, E, Al Ghamdi, MA, and Almasri, A (2020). Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm. Arabian Journal for Science and Engineering. 45, 3369-3378. https://doi.org/10.1007/s13369-020-04394-w
    CrossRef
  46. Almotiri, SH (2021). Integrated fuzzy based computational mechanism for the selection of effective malicious traffic detection approach. IEEE Access. 9, 10751-10764. https://doi.org/10.1109/ACCESS.2021.3050420
    CrossRef
  47. Almotiri, SH, and Al Ghamdi, MA (2022). Network quality assessment in heterogeneous wireless settings: an optimization approach. Computers, Materials & Continua. 71, 439-455. https://doi.org/10.32604/cmc.2022.021012
    CrossRef